1. just deployed this scenario couple weeks ago. with this option, i guess you can configure the remote vpn access on the router. on the router, a route is needed for the inside net by pointing to the asa; asa would have "nat-control" disabled, and having the router as the default gateway.
2. router needs to forward udp 500 and udp 4500 to the asa outside interface ip. in theory, it should work but i've never deploy such scenario.
ip nat inside source static udp 500 500
ip nat inside source static udp 4500 4500
3. not sure what you mean, but it seems too complicated.
deploying option 2 is not recommended as a long term solution, you should look for more public ip from the isp.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...