how to control client-to-site activity (IPSEC ASA)
I have a client to site VPN setup on my 5505 per instructions in Chapter35 of the ASA8.x configuration guide.
One thing I am not sure about is how do I control what VPN users can connect to? I dont see anything in the config that binds them to the inside interface so what is preventing them from connecting to the DMZ as well? How do limit their connectivity so they can only connect to one host on the inside? or one host on the inside and one on the DMZ?
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...