Configure on ASA5520 SSLVPN

I have a Version of 5520 6, configure sslvpn on that, but I can't find instructions for version 6. Everything is version 5 or greater.

Is there anything out there for this version?

You can use the same examples under 5.x to version 6.x, go to this link ssl vpn web topic, that's all there is.

Web/VPN SSL VPN

http://www.Cisco.com/en/us/products/ps6120/prod_configuration_examples_list.html

Tags: Cisco Security

Similar Questions

  • I get the error message on debugging ipsec-l2l tunnel

    Hello

    Can someone help me understand the debug message?
    I get the error message on debugging ipsec-l2l tunnel

    I tried to configure an ASA5520 with an ipsec-l2l to ios router 1721

    = 1721 router =.

    Cisco 1721 (flash: c1700-k9o3sy7 - mz.123 - 2.XC2.bin)
    80.89.47.102 outside
    inside 10.100.110.1 255.255.255.0

    Debug crypto ipsec
    Debug crypto ISAKMP

    -config-
    crypto ISAKMP policy 1
    BA 3des
    md5 hash
    preshared authentication
    Group 2
    0 1234567890 128.39.189.10 crypto isakmp key address
    !
    !
    Crypto ipsec transform-set esp-3des pix-series
    !
    ASA 10 ipsec-isakmp crypto map
    defined by peer 128.39.189.10
    transform-set pix - Set
    match address 101
    !
    !
    interface FastEthernet0

    Outside-interface description

    IP 80.89.47.102 255.255.255.252

    NAT outside IP

    card crypto asa

    !

    interface Vlan10
    Inside description
    IP 10.100.110.1 255.255.255.0
    IP nat inside

    !

    !

    IP nat inside source overload map route interface FastEthernet0 sheep

    !

    access-list 101 permit ip 10.100.110.0 0.0.0.255 10.100.4.0 0.0.3.255

    !

    access-list 110 deny ip 10.100.110.0 0.0.0.255 10.100.4.0 0.0.3.255
    access-list 110 permit ip 10.100.110.0 0.0.0.255 any
    !
    sheep allowed 10 route map
    corresponds to the IP 110
    !

    = Config ASA =.

    Cisco 5520 ASA Version 8.2 (1)
    128.39.189.10 outside
    inside 10.100.4.255 255.255.252.0

    Debug crypto ipsec
    Debug crypto ISAKMP

    -Config-
    !
    Allow Access-list extended sheep 255.255.252.0 IP 10.100.4.0 10.100.110.0 255.255.255.0
    !
    access extensive list ip 10.100.4.0 outside110 allow 255.255.252.0 10.100.110.0 255.255.255.0
    !

    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    86400 seconds, duration of life crypto ipsec security association
    Crypto ipsec kilobytes of life - safety 4608000 association
    card crypto outside_map 11 match address outside110
    peer set card crypto outside_map 11 80.89.47.102
    card crypto outside_map 11 game of transformation-ESP-3DES-MD5
    outside_map interface card crypto outside
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    md5 hash
    Group 2
    life 86400

    !

    attributes of Group Policy DfltGrpPolicy
    VPN-idle-timeout no
    Protocol-tunnel-VPN IPSec

    !

    tunnel-group 80.89.47.102 type ipsec-l2l
    IPSec-attributes tunnel-group 80.89.47.102
    pre-shared key 1234567890

    Concerning
    Tor

    You have a transformation defined on the SAA named ESP-3DES-MD5? Your crypto card refers to that but I don't see it listed in the config you have posted. I don't have much experience with routers, but is MD5 hashing algoritm (and why it is not)?

    James

  • How to get the ASA packets that come in and out on the same interface?

    Hi all

    How can I configure the ASA5520 routes the packets that come in and out on the same interface? I ve more than 1 network behind the camera of the SAA. It s separated by internal router. They can communicate with each other.

    I've seen it's PIX design problem. She applies to the platform of the ASA?

    Please advice.

    Thank you

    Nitass

    This golden rule remains immutable. the only exception is the vpn traffic. ASA for example (or pix v7) would act as a hub for traffic between two rays rediect vpn.

    regarding your question.

    Internet <-->asa <-->1 <-->lan router <-->lan 2

    assuming the host to lan 1 to asa as the gateway default, even asa has a static route to the internal router of the point for local network 2, the golden rule will reject this operation.

    one solution is to re - configure the dhcp on the LAN 1 scope and make the internal router as the default gateway; and the internal router has the asa as the default gateway.

  • Configure asa5520 help

    I connected my asa5520 as:

    CAT6 (port Access)-> ASA5520 (outside)

    CAT6 (trunk port)-> (inside)-> vlan101 and vlan 102

    because I need people to see inside the machines, I used "no-nat-control."

    asa5520 configured as:

    interface GigabitEthernet0/0

    No nameif

    no level of security

    no ip address

    !

    interface GigabitEthernet0/0,101

    VLAN 101

    nameif vlan101

    security-level 100

    10.1.1.1 IP address 255.255.255.0

    !

    interface GigabitEthernet0/0,102

    VLAN 102

    nameif vlan102

    security-level 100

    10.1.2.1 IP address 255.255.255.0

    !

    interface GigabitEthernet0/1

    nameif outside

    security-level 0

    IP 10.1.3.9 255.255.255.0

    access outside the permitted scope icmp a session list

    access outside the interface allowed icmp extended outside the vlan101 interface list

    outside access-group in external interface

    on the cat6, I add static route:

    Route IP 10.1.1.0 255.255.255.0 10.1.3.1

    IP route 10.1.2.0 255.255.255.0 10.1.3.1

    Currently:

    in the box to asa5520, I ping out any machine, but not inside any machine (10.1.1.12 or 10.1.2.12)

    from the outside, I can ping external interface (10.1.3.9), not in interface 10.1.1.1 and not inside the 10.1.1.12 machine

    inside the 10.1.1.12 machine, cannot ping anything.

    Please advice me what I did wrong?

    Thanks in advance

    Did you apply the "permit same-security-traffic inter-interface" command? This is to allow communication between the same interfaces of security (enabled by the inter-interface same-security-traffic command) offers the following benefits:

    ? You can configure more than 101 communication interfaces. If you use different levels for each interface, you can configure only one interface per level (0 to 100).

    ? You can allow traffic to flow freely between all the interfaces of security even without access lists.

    This is necessary because both of your interfaces Vlan101 and Vlan102 are set to use the same level of security 100:

    HostName (config) # permit same-security-traffic inter-interface

    hostname (config) #static (vlan101, vlan102) 10.1.1.0 10.1.1.0 netmask 255.255.255.0

    hostname (config) #static (vlan102, vlan101) 10.1.2.0 10.1.2.0 255.255.255.0 netmask

    http://www.Cisco.com/en/us/customer/products/ps6120/products_command_reference_chapter09186a008063f0fb.html#wp1283601

    Pls note all useful message (s)

    HTH

    AK

  • How to configure ASA5520 of Checkpoint IPsec tunnel configuration

    Hi guys and under tension, a lot of it!

    I have a problem, I set up an IPsec tunnel between my ASA5520 at a Checkpoint Firewall (PE) CONFIG below (not true FT)

    network of the ASA_MAPPED object

    4.4.4.0 subnet 255.255.255.0

    network of the CHECKPOINT_MAPPED object

    5.5.5.5.0 SUBNET 255.255.255.0

    OUT_CRYPTO extended access list permit ip object ASA_MAPPED object CHECKPOINT_MAPPED

    Crypto ipsec transform-set ikev1 CHECKPOINT_SET aes - esp esp-sha-hmac

    destination NAT (INSIDE, OUTSIDE) static source ALLNETWORKS(10.0.0.0/16) ASA_MAPPED CHECKPOINT_MAPPED of CHECKPOINT_MAPPED static

    NAT (INSIDE, OUTSIDE) source of destination ALLNETWORKS(10.0.0.0/16) static ASA_MAPPED static 4.4.4.11 5.5.5.11

    card crypto OUTSIDE_MAP 5 corresponds to the address OUT_CRYPTO

    OUTSIDE_MAP 5 set crypto map peer X.X.X.X

    card crypto OUTSIDE_MAP 5 set transform-set CHECKPOINT_SET ikev1

    card crypto OUTSIDE_MAP 5 defined security-association life seconds 3600

    CHECKPOINT_MAP interface card crypto OUTSIDE

    tunnel-group X.X.X.X type ipsec-l2l

    tunnel-group ipsec-attributes X.X.X.X

    IKEv1 pre-shared-key 1234

    ISAKMP crypto 10 nat-traversal

    Crypto ikev1 allow outside

    IKEv1 crypto policy 10

    preshared authentication

    aes encryption

    sha hash

    Group 5

    life 86400

    IPsec Tunnel is in place and I can access the server on the other side via the beach of NATTED, for example a server behind the checkpoint with the IP 10.90.55.11 is accessible behind the ASA as 4.4.4.11, the problem is that I have never worked on a Checkpoint Firewall and servers/Server 4.4.4.11 that I can't connect to my environment to that checkpoint is configured with a Tunnel interface that is also supposed to to make NAT because of the superimposition of networks, at one point, I added an access to an entire list and bidirectional routing has been reached, but I encountered a new problem, I could not overlook from my servers public became unaccessecable, since all traffic was encrypted and get dropped to VPN: ipsec-tunnel-flow... for now the Tunnel is up and I can access the server via NAT 4.4.4.11, but can't access my internal servers. What did I DO WRONG (also, I don't have access to the Checkpoint Firewall (PE)) how their installation would be or how it should be to allow bidirectional routing?

    ========================================================

    Tag crypto map: CHECKPOINT_MAP, seq num: 5, local addr: X.X.X.X

    Access extensive list ip 4.4.4.0 OUT_5_CRYPTO allow 255.255.255.0 5.5.5.0 255.255.255.0

    local ident (addr, mask, prot, port): (4.4.4.0/255.255.255.0/0/0)

    Remote ident (addr, mask, prot, port): (5.5.5.0/255.255.255.0/0/0)

    current_peer: X.X.X.X

    #pkts program: 3207, #pkts encrypt: 3207, #pkts digest: 3207

    #pkts decaps: 3417, #pkts decrypt: 3417, #pkts check: 3417

    compressed #pkts: 0, unzipped #pkts: 0

    #pkts uncompressed: 3207, model of #pkts failed: 0, #pkts Dang failed: 0

    success #frag before: 0, failures before #frag: 0, #fragments created: 0

    Sent #PMTUs: 0, #PMTUs rcvd: 0, reassembly: 20th century / of frgs #decapsulated: 0

    #send errors: 0, #recv errors: 0

    local crypto endpt. : X.X.X.X/0, remote Start crypto. : X.X.X.X/0

    Path mtu 1500, fresh ipsec generals 74, media, mtu 1500

    current outbound SPI: 5254EDC6

    current inbound SPI: 36DAB960

    SAS of the esp on arrival:

    SPI: 0x36DAB960 (920303968)

    transform: aes - esp esp-sha-hmac no compression

    running parameters = {L2L, Tunnel}

    slot: 0, id_conn: 19099648, crypto-card: CHECKPOINT_MAP

    calendar of his: service life remaining (KB/s) key: (3914999/3537)

    Size IV: 16 bytes

    support for replay detection: Y

    Anti-replay bitmap:

    0 x 00000000 0x0000000F

    outgoing esp sas:

    SPI: 0x5254EDC6 (1381297606)

    transform: aes - esp esp-sha-hmac no compression

    running parameters = {L2L, Tunnel}

    slot: 0, id_conn: 19099648, crypto-card: CHECKPOINT_MAP

    calendar of his: service life remaining (KB/s) key: (3914999/3537)

    Size IV: 16 bytes

    support for replay detection: Y

    Anti-replay bitmap:

    0x00000000 0x00000001

    unless I include any any on my access-list and the problem with that is  that my Public servers then get encrypted from the OUTSIDE interface  unless you know of a way to bypass the VPN

    No, u certainly shouldn't allow 0.0.0.0 for proxy ACL. Again, your config is very good. In addition, package account, this show that traffic is going throug the tunnel in two ways:

    #pkts program: 3207

    #pkts decaps: 3417

    Also, looking at the meter, I can guess that some of the traffic comes from the other site, but does not return back (maybe that's where you can not connect from behing Checkpoint). If you say that 0.0.0.0 solved the problem, are there no other NAT rules for subnet behind ASA, so the server IP, for which you are trying to connect behind the checkpoint, translates into something else (not the beach, included in proxy ACL), when to come back?

  • ASA5520-K8 7.0 (6) asdm 5.0 missing Interface configuration commands

    Hello

    I have try the mac address on the interface value

    Firewall/admin(config)# interface gigabitEthernet0/2

    Firewall/admin(config-if)# ?

    Interface configuration commands:

    asr-group        Configure Asymmetrical Routing group id

    default          Set a command to its defaults

    description      Interface specific description

    exit             Exit from interface configuration mode

    help             Interactive help for interface subcommands

    ip               Configure ip addresses.

    ipv6             IPv6 interface subcommands

    management-only  Dedicate an interface to management. Block thru traffic

    nameif           Assign name to interface

    no               Negate a command or set its defaults

    security-level   Specify the security level of this interface after this

    keyword, Eg: 0, 100 etc. The relative security level between

    two interfaces determines the way the Adaptive Security

    Algorithm is applied. A lower security_level interface is

    outside relative to a higher level interface and equivalent

    interfaces are outside to each other

    shutdown         Shutdown the selected interface

    I found how to set the mac address with mac-address command, but I don't have it in there.

    http://www.Cisco.com/c/en/us/TD/docs/security/ASA/asa72/configuration/guide/conf_gd/intParam.html

    Thank you for any hint how to solve.

    Hello

    According to your request, the MAC address command is not supported on your current version and is available from ASA 7.2.1 go.

    Check this box: -.

    http://www.Cisco.com/c/en/us/TD/docs/security/ASA/command-reference/cmdref/M1.html#pgfId-2111047

    Thank you and best regards,

    Maryse

  • Getting started: ASA5520 w / AIP - SSM

    I'm trying to deploy an ASA5520 to a customer. I have no problem with the piece of implementing firewall, but I don't know where to start with the piece of IPS.

    I searched a bit on the ASA55XX & AIP - SSM, but can't seem to find much on what to do with the AIP - SSM beyond the initial Setup.

    Can someone point me to some beginners IPS documentation that focuses on the AIP - SSM?

    Thank you

    Jeff

    In my view, there is a lack of documentation on how to get the IPS module to work with the ASA. It would be nice if there was a single document on how to get IPS working module with the ASA.

    Start with the documentation of the IPS. It's just on how to configure the IPS himself module. Assign an IP address for management, set the admin password, etc..

    http://www.Cisco.com/univercd/CC/TD/doc/product/iaabu/csids/csids12/index.htm

    Then go to the documentation of the SAA on how to configure ASA to send traffic to IP addresses (via a service-policy):

    http://www.Cisco.com/univercd/CC/TD/doc/product/iaabu/csids/csids11/cliguide/clissm.htm#wp1033926

    There is a free viewer of IPS Cisco event offering to monitor events on the IPS. It can be downloaded from the download page of the Cisco IPS software.

    Finally, read the whitepaper SAFE on the deployment of the IPS and the setting.

    http://www.Cisco.com/en/us/NetSol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a00801bc111.shtml

    I hope this helps. Remember messages useful rate. Thank you!

  • NAT 0 to inside and outside of translations in ASA5520

    We have a nat (inside) 0 acl-sheep config statement that defines an acl not NAT 10 internal networks to specific external networks. In addition, we have remote VPN connections that terminate on the ASA5520, and we have 10 networks on sites remote not nat to external networks as well.

    My questions are:

    (1) can I configure a command "nat 0 (outside) acl-nonatremote" in sheep these remote users?

    (2) a nat (inside) 0 aclxx1 can coexist with a nat 0 (outside) aclxx2?

    (3) will be implemented from the nat 0 (outside) command causes a power outage during the implementation or will it be a transparent change? (i.e. a nat acl must be removed and redone to allow them to take effect in the right order).

    Any comments would be appreciated.

    Thank you

    -Scott

    Hi Scott,.

    Don't worry, you're on the right track. Just one last thing, if you have a 'global (internal), 10' then you need to add inside subnet / network in the acl-remotenonat as a destination.

    Kind regards

    Kamal

  • SSLVPN - impossible to verify routing

    Greetings,

    I enter the following shortly after the cut in our SSLVPN on an ASA5510. I was unable to find anything about this error, or find something wrong with our configurations. Any help will be appreciated.

    Group user IP SVC Message: 17/ERROR: cannot successfully verify all routing table changes are correct...

    ... There is no routing table changes made. It left me speechless.

    Thank you

    Check software SSL is updated, otherwise it will give errors when you try to connect.

  • ASA5520 routing?

    I connected my asa5520 as:

    CAT6 (port Access)-> ASA5520 (outside)

    CAT6 (trunk port)-> (inside)-> vlan101 and vlan 102

    Configure asa5520 as:

    interface GigabitEthernet0/0

    nameif inside

    security-level 100

    no ip address

    !

    interface GigabitEthernet0/0,101

    VLAN 101

    No nameif

    no level of security

    10.1.1.1 IP address 255.255.255.0

    !

    interface GigabitEthernet0/0,102

    VLAN 102

    No nameif

    no level of security

    10.1.2.1 IP address 255.255.255.0

    !

    interface GigabitEthernet0/1

    nameif outside

    security-level 0

    IP 10.1.3.9 255.255.255.0

    on the cat6, I add static route:

    Route IP 10.1.1.0 255.255.255.0 10.1.3.0

    Because I don't want to use Protocol ospf/rip road. Can I use static route? If so, how can I do it?

    Any comments will be appreciated

    Thanks in advance

    I think your static route in Cat6 must point to the IP of specific next hop of 10.1.3.x instead of 10.1.3.0 (it is subnet ID).

    Anyway, you can still use static in ASA. It supports RIP OSPF.

    To configure static on ASA to Cat6, use (example):

    Route outside 0.0.0.0 0.0.0.0 10.1.3.1, or

    external route 10.1.1.0 255.255.255.0 10.1.3.1

    * assuming 10.1.3.1 is your IP of the interface Vlan Cat6 facing ASA outside interface

    Otherwise, from Cat6, road to ASA inside VLan 101:

    Route IP 10.1.1.0 255.255.255.0 10.1.3.9

    But the other condition is that you must configure static nat for the Vlan101 to talk to the segment of the outside, inside like:

    static (inside, outside) 10.1.1.0 10.1.1.0 netmask 255.255.255.0

    This will allow users/guests of the outside/Cat6 side to talk to Vlan101 internal hosts.

    HTH

    AK

  • The PAT problems policy configuration

    We run an ASA5520, and must configure Global separate outside PAT addresses based on different subnets to source. Attached is a sample of the current configuration of the NAT on the SAA, which does not work as expected. We owe the 10.0.0.0/8 Pat 1.1.1.1 and 10.1.19.0/24 to PAT to 1.1.1.2.

    Try this url

    http://Cisco.com/en/us/products/HW/vpndevc/ps2030/products_configuration_example09186a008046f31a.shtml

  • VPN Internet access ASA5520

    Now my VPN works fine, it connects the user to the network, but it prevents them from using the internet.

    How can I set ASA5520 to force users to use their staff internet vs. Internet companies through the VPN tunnel?

    I agree with Jay's advice on the implications of the split tunneling and the potential threat to your network.

    With the ASA and 7 code version you aren't necessarily need to proxy server. In PIX code pre 7 versions the PIX would not transmit on the same interface, happened on the traffic. With version 7 (also good for PIX and ASA) code, it is possible to configure it so that it will transmit to the interface on which it was received. So even if a proxy server can be a good thing he is most needed.

    HTH

    Rick

  • asa5520s load sharing

    Greeting

    I configure Active/active failover on two boxes.

    but, it looks like two active/standby add now. (for subnet 1 go to the first asa5520 and traffic subnet 2 second go to asa5520).

    If possible, configure a subnet share the load on the two asa5520s? If so, how can I do it?

    Comments will be apprecaited

    Thanks in advance

    Product sheet ASA5520 stipulates a flow rate up to 450Mbps and for its 225Mbps vpn, so when you create the solution, you should consider the existing network installation and also the volume of future growth.

    In your case, it's a multi context configuration, so it will not VPN, support dynamic routing, so you need not worry about the use of these features in the future.

    However, sometimes you may experience heavy traffic / firewall uses of the resource due to some malwares or show WILL scan through the firewall

    To avoid this kind of situation,

    Configure the firewall to perform anti-spoofing, prevent back attacks by limiting / control the concurrent connections/sessions.

    Here is a link for Cisco to prevent network attacks.

    http://www.Cisco.com/en/us/products/ps6120/products_tech_note09186a00809763ea.shtml

  • Cisco ASA5520 facing ISP with private IP address. How to get the IPSec VPN through the internet?

    / * Style definitions * / table. MsoNormalTable {mso-style-name : « Table Normal » ; mso-tstyle-rowband-taille : 0 ; mso-tstyle-colband-taille : 0 ; mso-style-noshow:yes ; mso-style-priorité : 99 ; mso-style-qformat:yes ; mso-style-parent : » « ;" mso-rembourrage-alt : 0 à 5.4pt 0 à 5.4pt ; mso-para-marge-top : 0 ; mso-para-marge-droit : 0 ; mso-para-marge-bas : 10.0pt ; mso-para-marge-left : 0 ; ligne-hauteur : 115 % ; mso-pagination : widow-orphelin ; police-taille : 11.0pt ; famille de police : « Calibri », « sans-serif » ; mso-ascii-font-family : Calibri ; mso-ascii-theme-font : minor-latin ; mso-fareast-font-family : « Times New Roman » ; mso-fareast-theme-font : minor-fareast ; mso-hansi-font-family : Calibri ; mso-hansi-theme-font : minor-latin ;}

    Hello guys,.

    I have Cisco ASA5520 facing the ISP with private IP address. We don't have a router and how to get the IPSec VPN through the internet?

    The question statement not the interface pointing to ISP isn't IP address private and inside as well.

    Firewall configuration:

    Firewall outside interface Gi0 10.0.1.2 > ISP 10.0.1.1 with security-level 0

    Firewall inside the interface Ethernet0 192.168.1.1 > LAN switch 192.168.1.2 with security-level 100

    I have public IP block 199.9.9.1/28

    How can I use the public IP address to create the IPSec VPN tunnel between two sites across the internet?

    can I assign a public IP address on the Gig1 inside the interface with the security level of 100 and how to apply inside to carry on this interface?

    If I configure > firewall inside of the item in gi1 interface ip address 199.9.9.1/28 with security-level 100. How to make a safe lane VPN through this interface on the internet?

    I'm used to the public IP address allocation to the interface outside of the firewall and private inside the interface IP address.

    Please help with configuration examples and advise.

    Thank you

    Eric

    Unfortunately, you can only complete the VPN connection on the interface the VPN connection source, in your case the external interface.

    3 options:

    (1) connect a router in front of the ASA and assign your public ip address to the ASA outside interface.

    OR /.

    (2) If your ISP can perform static translation of 1 to 1, then you can always finish the VPN on the external interface and ask your provider what is the static ip address assigned to your ASA out of the IP (10.0.1.2) - this will launch the VPN of bidirectionally

    OR /.

    (3) If your ISP performs PAT (dynamic NAT), then you can only start the tunnel VPN on the side of the ASA and the other end of the tunnel must be configured to allow VPN LAN-to-LAN dynamics.

  • License to ASA5520 AnyConnect

    Dear team,

    Here is the configuration of one of our clients and they asked for 50 users Anyconnect license with the software installed on the client.

    **************************************************************************************************************************

    ABC # sh ver

    Cisco Adaptive Security Appliance Version 8.2 software (2)
    Version 5.2 Device Manager (3)

    Updated Tuesday, January 11, 10 14:19 by manufacturers
    System image file is "disk0: / asa822 - k8.bin.
    The configuration file to the startup was "startup-config '.

    PSO - ASA up to 110 days 22 hours
    failover cluster upwards of 110 days 22 hours

    Material: ASA5520, 512 MB RAM, Pentium 4 Celeron 2000 MHz processor
    Internal ATA Compact Flash, 256 MB
    BIOS Flash M50FW080 @ 0xffe00000, 1024 KB

    Hardware encryption device: edge Cisco ASA - 55 x 0 Accelerator (revision 0 x 0)
    Start firmware: CN1000-MC-BOOT - 2.00
    SSL/IKE firmware: CNLite-MC-Smls-PLUS - 2.03
    Microcode IPSec:-CNlite-MC-IPSECm-HAND - 2.04
    0: Ext: GigabitEthernet0/0: the address is 001e.f760.a75c, irq 9
    1: Ext: GigabitEthernet0/1: the address is 001e.f760.a75d, irq 9
    2: Ext: GigabitEthernet0/2: the address is 001e.f760.a75e, irq 9
    3: Ext: GigabitEthernet0/3: the address is 001e.f760.a75f, irq 9
    4: Ext: Management0/0: the address is 001e.f760.a760, irq 11
    5: Int: internal-Data0/0: the address is 0000.0001.0002, irq 11
    6: Int: not used: irq 5
    7: Ext: GigabitEthernet1/0: the address is 001e.f760.b729, irq 255
    8: Ext: GigabitEthernet1/1: the address is 001e.f760.b72a, irq 255
    9: Ext: GigabitEthernet1/2: the address is 001e.f760.b72b, irq 255
    10: Ext: GigabitEthernet1/3: the address is 001e.f760.b72c, irq 255
    11: Int: internal-Data1/0: the address is 0000.0003.0002, irq 255

    The devices allowed for this platform:
    The maximum physical Interfaces: unlimited
    VLAN maximum: 150
    Internal hosts: unlimited
    Failover: Active/active
    VPN - A: enabled
    VPN-3DES-AES: enabled
    Security contexts: 2
    GTP/GPRS: disabled
    SSL VPN peers: 2
    Total of the VPN peers: 750
    Sharing license: disabled
    AnyConnect for Mobile: disabled
    AnyConnect Cisco VPN phone: disabled
    AnyConnect Essentials: disabled
    Assessment of Advanced endpoint: disabled
    Proxy sessions for the UC phone: 2
    Total number of Sessions of Proxy UC: 2
    Botnet traffic filter: disabled

    This platform includes an ASA 5520 VPN Plus license.

    Serial number: JMX1210L21K
    Activation key running: 0x7c1f6a6e 0x44e5b71d 0xa8b04110 0x9e043c5c 0x0d329294
    Registry configuration is 0x1
    Last modified by enable_15 at 10:58:52.275 UTC Wednesday, December 18, 2013 configuration

    ****************************************************************************************************************************************

    I quoted the "L-ASA-SSL-50 =" but confused about licensing ASA.

    Please let me know if it's the right one or should I cite something else?

    Kindly let me know if we need to buy the client software for client based SSL VPN?

    Kind regards

    Farhan.

    If the fares user requests the license 50 so I think because it is a pretty clear indication that they are interested in the premium license on this 5520 Essentials license would give them the total number of VPN connections that the platform supports (750 for the 5520).

    Farhan may want to talk with the user know if the Essentials license would give them what they want. If YES Essentials license is much cheaper than the Premium license. What you get with the premium license you do not get with the Essentials license is clientless VPN support and support for things like the assessment distance. But for regular client access VPN Essentials license is often enough.

    Also note that these licenses grant users access when using the regular PC platforms. If you want users to access using mobile devices like smart phones, then you also need the AnyConnecct for the Mobile license.

    HTH

    Rick

Maybe you are looking for