Cisco ASA 5505 Configuration Manual page 1354

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Configuring AnyConnect (SSL) VPN Client Connections
Log into the ASDM and select Configuration > Firewall > NAT Rules.
Step 1
Create a NAT rule so that the hosts in the Engineering VPN address pool can reach the hosts in the Sales
Step 2
VPN address pool. In the NAT Rules pane, select Add > Add NAT Rule Before "Network Object"
NAT rules so that the ASA evaluates this rule before other rules in the Unified NAT table. See
Figure 64-2 on page 64-44
Note
Figure 64-2
In the Match criteria: Original Packet area, configure these fields:
a.
Cisco ASA 5500 Series Configuration Guide using ASDM
64-44
for an example of the Add NAT rule dialog box.
In ASA software version 8.3, NAT rule evaluation is applied on a top-down, first match basis.
Once the ASA matches a packet to a particular NAT rule it does not perform any further
evaluation. It is important that you place the most specific NAT rules at the top of the Unified
NAT table so that the ASA does not prematurely match them to broader NAT rules.
Add NAT rule dialog box
Source Interface: Any
Destination Interface: Any
Source Address: Click the Source Address browse button and create the network object that
represents the Engineering VPN address pool. Define the object type as a Range of addresses.
Do not add an automatic address translation rule. See
Destination Address: Click the Destination Address browse button and create the network
object that represents the Sales VPN address pool. Define the object type as a Range of
addresses. Do not add an automatic address translation rule.
Chapter 64
General VPN Setup
Figure 64-3
for an example.
OL-20339-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents