I am in a somewhat exotic scenario, and trying to figure out if what I want is possible.
We are allocated a public network: 188.8.131.52/24.
We have got two networks : Office (184.108.40.206/26) and Dev (220.127.116.11/26). Both networks include their own gateways. We do not run any NAT whatsoever.
I have bought an ASA 5505 and would like to set it up so that remote users can set-up a VPN using AnyConnect, and that they get put in one of the two networks.(note: This could be a choice upon connection, but I already confirmed that I can use our Radius server to force this based on specific group membership).
My first 'problem' is that we do not have any concept of 'inside' or 'outside' networks, everything is public IP, and computers are protected by access lists on our Cat3750.
I started by picking one of our two networks and designating that as 'office' (instead of 'internal'), assigned a free IP in that network, made sure it was reachable from the internet. For this I had to set up a static route to the Office gateway (18.104.22.168). After setting up the certificates etc I was able to log in with the AnyConnect client. The client then also uses 22.214.171.124 as the default gateway. So far so good.
Now I add another vlan interface fro use with the Dev network. I also assign a free IP from that network. Now I am stuck. If I connect to that IP my traffic is routed via the other network because of the static routes.
My question is hence: it is possible to connect the ASA to two different public networks, have clients connect to it, and have all their traffic run through those networks?
I hope my story makes sense, if not please ask ;-)
Please provide a network diagram indicating how your network is set up and how you would like the clients to connect.
This is what I would like to do. Two networks connected to the ASA. I pick one address for users to connect to: 126.96.36.199.
I would like them to be able to use one of the two networks and tunnel all their traffic through it.
If needed yes, we could give it a 3rd IP address.
However, I think we would have to buy the security-plus license because now only 2 vlans are supported.
That is part of the reason I'm asking because if I can get it to work with the base license it would be better...
Do these two subnets need to talk to each other? If no, then you do not need
to worry about security plus license.
So from what I understand you have 2 kinds of users: user D (dev) and user O (office). and you have the following requirement:
1. When D connects to 188.8.131.52 you want this user to be able to access only 184.108.40.206/26 n/w
2. When ) connects to 220.127.116.11 you want this user to be able to access only 18.104.22.168/26 n/w
If my understanding is correct then this should be fairly simple. As you mentioned you can use DAP to restritct which tunnel group a user connects to once. SO create 2 seperate tunnel groups , viz tunnel-group D and tunnel-group O. Definer 2 seperate group-policies for each of the tunnel-groups. Under the group-policy for D define a split-tunnel access-list which only allows access to the 22.214.171.124 and for F define one that only allows access to 126.96.36.199. For more information on how to configure split tunneling please refer to the following link:
Although this link defines the process for IPSEC clients, it's the same steps for Anyconnect.
Having said this, I would say that to get optimal usage out of the ASA you should us a topology that looks something like this:
Alternately you can get a security plus licence and create a two seperate VLANs for the two networks and use one interface as the outside interface. This would be the best way to design the network.
> 1. When D connects to 188.8.131.52 you want this user to be able to access only 184.108.40.206/26 n/w
> 2. When ) connects to 220.127.116.11 you want this user to be able to access only 18.104.22.168/26 n/w
When D connects to 22.214.171.124 he should be allowed access to 126.96.36.199/26, but have all the other traffic tunneled through the default gw of that network, which is 188.8.131.52.
Wen O connects to 184.108.40.206 he should be allowed access to 220.127.116.11/26, but have all the other traffic tunneled through the default gw of that network, which is 18.104.22.168.
And I already asked permission to buy security plus lisense. The mentioned networks are already VLANs on our Catalyst 3750, so with security plus lic it might even possible to create a trunk. Will let you guys know.
Another issue is that we also have public IPv6 address space, and the mentioned split-tunnel set-up would not work as this is not (yet) supported in ASA 8.3.2. So VLAN setup would indeed be mandatory.
For VPN clients there is no way to push a default gateway. If you look at the VPN adapter you will see a default gateway configured this is normally the first IP in the subnet to which the address pool belongs.
What you could try is configuring VLAN under the group-policy for each tunnel group. This defines the egress VLAN for the all traffic belonging to that group, so if you already have two separate vlans configured you can define the correct egress vlan for the correct tunnel group. For more information regarding that command please refer to the following link:
This does not work unfortunately.
I would like to put users into different VLANs, which works fine, but I also want the default gateway to be the one of that VLAN, which is not supported by Cisco.
Someone else ran into this as well:
I will have to buy an ASA for each VLAN.