Can't SSH into ASA after configuring EZVPN and not specifying "split-tunnel-policy tunnelspecified"
Even after specifying "split-tunnel-policy tunnelspecified" with "split-tunnel-network-list value SPLIT-TUNNEL" and denying all traffic to/from the public IP of the ASA, I'm still not able to SSH into the firewall. Everything else appears to be working OK, but I need to be able to manage the ASA from the public interface. Actually, I kind of expect this given the say an sa is setup for the tunnel, and it would seem that a deny statement would be ignored, but maybe there is a way around this. Thank you.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...