SSL vpn site to site vpn

I have a couple of site to site VPN working properly on an ASA 5515. Don't know what is on the other side, as I haven't seen them. I configured a SSL vpn for remote users who must be able to access resources on remote sites. I got access to the network of site without any problems and and have added the range of IP addresses for remote users to links from site to site, but I am unable to connect. Anyone who has this performance, it would be greatly appreciated if you can help.

Hi mbluemel,

You need to configure the remote side to allow traffic from the remote side for SSL VPN users.
This list of documents the measures taken to achieve this: -.

http://www.petenetlive.com/kb/article/0000040.htm

For more information: -.
http://www.Cisco.com/c/en/us/support/docs/security/ASA-5500-x-series-NEX...

Kind regards
Dinesh Moudgil

PS Please rate helpful messages.

Tags: Cisco Security

Similar Questions

  • ASA from Site to Site and SSL VPN stop working

    Thanks in advance for any advice

    We have an ASA 5510, users were able to connect via to all connect without any problems. We opened a new office with an ASA 5505 and decided to give VPN site-to-site on IPSec. We used the basic wizard and everything went smoothly at both ends. However, users who always used SSL VPN says so that they can connect to the original site, they are no longer in their RDP virtual machines or get anywhere on the network. I don't know why something like this can happen.

    You can change the SSL VPN DHCP scope to give a different subnet for IP addresses. Maybe try 192.168.10.0 255.255.255.0. Let me know if you can and if that corrects the issue.

    Sent by Cisco Support technique iPhone App

  • SSL vpn through the same internet connection to another site

    Hi, I have a network with a box of Juniper SSL that connect to port DMZ ASA5510, wher outside the ASA is the same outside the box of SSL vpn.

    To access issues eno hav network internal at all.

    Now, I need VPN SSL Juniper box remote users and internal conenct o my remote sites, who take the client connection through an internet router (Cisco throug site to site vpn IPSec) again to the th eremote site.

    Is it possible, my hunch is Yes "can be done."

    Currently, I'm fitting get no where, I get no hits ASA DMZ ACL if I try to access the remote site of the SSL vpn client resources.

    Schema attached

    Any help would be appreciated

    Shouldn't be a problem.

    On the Juniper SSL, you must check if the roads has been added to the remote IPSec LAN point to the ip address DMZ ASA instead of pointing to the internet through the Juniper SSL box.

    You need to configure NAT exemption on the ASA box between the pool SSL subnet to the Remote LAN of IPSec. As a result, you must also include the SSL subnet to Remote LAN subnets in the crypto ACL and mirror image ACL on the remote site ACL Cryptography.

    Hope that helps.

  • Unable to connect to the site Web SSL VPN with firewall zone configured

    I recently updated my 2911 company and set up a firewall area.  This is my first experience with this and I used Cisco Configuration Professional to build the configuration of the firewall first and then edited the names to make it readable by humans.  The only problem I can't solve is to learn site Web SSL VPN from outside.  I can navigate the website and connect without problem from the inside, and even if it was useful to verify that the Routing and the site work properly it is really not what I.  I don't get anything on the syslog for drops because of the firewall server, or for any other reason but packet capture show that no response is received when you try to navigate to the outside Web site.  I am currently using a customer VPN IPSEC solution until I can get this to work and have no problem with it.  I have attached a sanitized with the included relevant lines configuration (deleted ~ 400 lines including logging, many inspections on the movement of the area to the area and the ipsec vpn, which I already mentioned).  I searched anything about this problem and no one has no problem connecting to their Web site, just to get other features to work correctly.  All thoughts are welcome.

    See the security box

    area to area

    Members of Interfaces:

    GigabitEthernet0/0.15

    GigabitEthernet0/0.30

    GigabitEthernet0/0.35

    GigabitEthernet0/0.45

    area outside zone

    Members of Interfaces:

    GigabitEthernet0/1

    sslvpn area area

    Members of Interfaces:

    Virtual-Template1

    SSLVPN-VIF0

    I tried to change the composition of the area on the interface virtual-Template1 to the outside the area nothing helps.

    See the pair area security

    Name of the pair area SSLVPN - AUX-in

    Source-Zone sslvpn-area-zone of Destination in the area

    Service-SSLVPN-AUX-IN-POLICY

    Name of the pair area IN SSLVPN

    Source-Zone in the Destination zone sslvpn-zone

    service-policy IN SSLVPN-POLICY

    Name of the pair area SELF SSLVPN

    Source-Zone sslvpn-area free-zone Destination schedule

    Service-SELF-to-SSLVPN-POLICY

    Zone-pair name IN-> AUTO

    Source-Zone in the Destination zone auto

    Service-IN-to-SELF-POLICY policy

    Name of the pair IN-> IN box

    In the Destination area source-Zone in the area

    service-policy IN IN-POLICY

    Zone-pair name SELF-> OUT

    Source-Zone auto zone of Destination outside the area

    Service-SELF-AUX-OUT-POLICY

    Name of the pair OUT zone-> AUTO

    Source-Zone out-area Destination-area auto

    Service-OUT-to-SELF-POLICY

    Zone-pair name IN-> OUT

    Source-Zone in the Destination area outside zone

    service-strategy ALLOW-ALL

    The pair OUT zone name-> IN

    Source-out-zone-time zone time Zone of Destination in the area

    Service-OUT-to-IN-POLICY

    Name of the pair area SSLVPN-to-SELF

    Source-Zone-Zone of sslvpn-area auto

    Service-SSLVPN-FOR-SELF-POLICY

    I also tried to add a pair of area for the outside zone sslvpn-zone passing all traffic and it doesn't change anything.

    The area of networks

    G0/0.15

    172.16.0.1 26

    G0/0.30

    172.16.0.65/26

    G0/0.35

    172.16.0.129/25

    G0/0.45

    172.18.0.1 28

    Pool of SSL VPN

    172.20.0.1 - 172.20.0.14

    Latest Version of IOS:

    Cisco IOS software, software C2900 (C2900-UNIVERSALK9-M), Version 15.0 (1) M10, RELEASE SOFTWARE (fc1)

    Glad works now. Weird question, no doubt.

    I guess that on the deployment guide said that the firewall will not support inspection of TCP to the free zone, however, class nested maps are used to accomplish this, to be completely honest, I think it's a mess and the best thing to do is action past to auto for the protocols that you want and then drop the rest.

    Let us know if you have any other problems.

    Mike

  • SSL VPN, is possible for the failing show the "untrusted site" warning when connecting

    SSL VPN, is possible for the not display the warning "untrusted site" when connecting. I trust 3rd cert left installed on the SAA. Is it possible, when I connect to it via the Web for the not give users the below page and just go to the connection. If they hit to continue it works but we are looking for a way to remove this error.

    There is a problem with this Web site's secure certificate.

    The security certificate presented by this website was not issued by an approved certification authority.

    A site address different Web issued the security certificate presented by this website.

    Security certificate problems may indicate an attempt to fool you or intercept any data you send to the server.

    We recommend that you close this webpage and do not make this Web site.

    Click here to close this webpage.

    Continue to this website (not recommended).

    More information

    Hi Jason,

    Follow these steps:

    1-no ssl trustpoint outside ssl.axisbu.com.trustpoint

    2 - webvpn

    no activation outside

    output

    3 - ssl trustpoint outside ASDM_TrustPoint3

    4 - webpvn

    allow outside

    It seems that he does not have the right certificate, probably the self-signed is stuck, please follow the steps and let me know.

    Thank you.

    Portu.

  • VPN site to Site and SSL VPN

    Hey guys,.

    I'm working on a solution. I have a Home Office with my data center being there while my DR site is my plant and she nearly 20 users. I have a third place, which is a branch offices with only 2 people.

    I intend to deploy a VPN Site to Site between the data center and DR Site while branches can connect via SSL VPN. Please confirm whether this solution is viable or not. Where do I go to a Site for the office too.

    Thank you

    If we knew more about your environment so we might be able to give more complete answers. But base on what you've described, I believe that a VPN site-to site between the data center and the disaster recovery site and VPN for remote access of the branch is an appropriate solution.

    HTH

    Rick

  • access of entrepreneurs and employees of the web site in-house using clientless ssl vpn.

    We have a layout of web SSL VPN without customer who allow employees and suppliers of connection and internal display web page.  I wonder if possible separate employees and contractors to access internal pages.  The internal web page has no authentication of users.  They would like to see if it is possible that traffic employees get proxy behind interface INSIDE IP de ASA and entrepreneur behind a different IP address proxy traffic.  Thus, the internal web page can check IP to contractor and only give them access to view certain web page, but not all pages.

    Hello

    Creating a group policy for each user group will be a good option, you can also use DAP to assign an ACL web to the user who logs on the portal without client, you can use the Radius, LDAP or Cisco attributes to associate the DAP for the user. For example, if you are using LDAP, you can create 2 groups separated here for employees and entrepreneurs and based on the LDAP user group membership, they will be assigned to specific web acl configured according to their access restrictions.

    You can follow this link to set up an acl of web:

    http://www.Cisco.com/c/en/us/TD/docs/security/ASA/asa83/asdm63/Configura...

    Once the ACL is ready, you can follow this guide to configure the DAP Protocol: "check the web for acls figure10.

    http://www.Cisco.com/c/en/us/support/docs/security/ASA-5500-x-series-NEX...

    Thank you, please note!

  • RVL200 - SSL VPN and firewall rules

    Forgive my ignorance, but I have been immersed in the configuration of this device RVL200 to allow Remoting SSL VPN to a customer site, sight unseen.  I have the basics of the VPN set up in config, but now move the firewall rules.  We want to block all internal devices to access the Internet, but I don't want to cripple the remote clients that will be borrowed by blocking their return via the SSL VPN traffic.  This leads to my questions:

    (1) a rule of DENIAL of coverage for all traffic OUTBOUND will prevent the primary function of the VPN (to allow the administration away from machines on the local network)?

    (2) if the answer to #1 is 'Yes', what ports/services do I need to open the side LAN?

    (3) building # 2, configuring authorized outbound rules apply only for VPN clients, rather than all the hosts on LAN?

    (4) as the default INCOMING traffic rule is to REFUSE EVERYTHING, do I have to create a rule to allow the VPN tunnel, or guess that in the configuration of the router?

    Here are some other details:

    • The LAN behind the RVL200 is also isolated LAN in a manufacturing environment
    • All hosts on this network have a static IP address on a single subnet.
    • The RVL200 has been configured with a static, public IP on the WAN/INTERNET side.
    • DHCP has been disabled on the RVL200
    • Authentication to the device will use a local database.
    • There is no such thing as no DNS server on the local network
    • The device upstream of the RVL200 is a modem using PPPoE DSL, and the device has been configured for this setting.
    • Several database of local users accounts were created to facilitate the SSL VPN access.

    I worked with other aspects of it for a long time, but limited experience with VPN and the associated firewall rules and zero with this family of aircraft.  Any help will be greatly appreciated.

    aponikikay, there is no port forwarding necessary to the function of the RVL200 SSL - VPN.

    Topic 1. That is not proven. It shouldn't do. The router should automatically make sure that the SSL - VPN router service is functional and accessible.

    Re 2. No transfer necessary. In addition, never before TCP/UDP port 47 or 50 for VPN functions. The TCP 1723 port is used for PPTP. UDP 500 is used for ISAKMP. You usually also to transmit TCP/UDP 4500 port for IPSec encapsulation.

    Let's not port 47. ERM is an IP protocol that is used for virtual private networks. It is a TCP or UDP protocol. GRE has 47 IP protocol number. It has nothing to do with TCP or UDP port 47. TCP and UDP are completely different protocols of free WILL.

    It goes the same for 50: ESP is the payload for IPSec tunnels. ESP is the Protocol IP 50. It has nothing to do with TCP or UDP port 50.

    'Transfer' of the GRE is configured with PPTP passthrough option.

    'Transfer' of the ESP is configured with IPSec passthrough option.

  • Error of java SSL VPN "ClassNotFoundException".

    I have a user who cannot access their bookmarks of Sonicwall Java running on our appliance virtual sonciwall. 5 HTML5 works, but it's slow and Active X works, but she would like to remotely from his mac, so I thought that java would be the best bet except that I cannot make it work in Internet Explorer. U45 8 Java is installed and active, however, when you click on the bookmark, we receive the below error.

    In the control panel under mixed Code Java, I've already activated "enable - hide warning and run with protections" and I added to the URL of the site on the Security tab, does anyone else have this problem?

    The firmware on our virtual appliance of Sonicwall's SonicOS SSL - VPN 8.0.0.1 - 16sv

    Pstoric you can open a support ticket with us?

    There are a few things, we want to check.

    It will be when you have access to the machine in question, of course.

  • SSL VPN and Windows 7 32 bit

    I wonder if it is possible to have 2 SSL VPN client running simultaneously at the same time. When I'm working out of the site, I have to do the following:

    1. I call Array SSL VPN network to connect to the corporate network. I need it to be able to read emails.

    2. I invoke some other developed internal SSL VPN client to connect to the customer's network. This is necessary to get access to access the Citrix customer environment.

    When I run the 2nd SSL VPN, my vision behaves erratically as the gel or the loss of connection to the exchange server.

    SSL VPN network table is a SSL VPN split, which means that it routes web traffic of the company and nothing else.

    Developed internal SSL VPN is configured to route specific IP range.

    I wonder if there is any limitation in Windows 7 32 - bit OS that prevent me to simultaneously run 2 SSL VPN clients.

    Appreciate your comments and your support.

    Hi SamPersis,

    Your question of Windows is more complex than what is generally answered in the Microsoft Answers forums. Appropriate in the TechNet forums.

    Please post your question in the Windows 7 IT Pro TechNet Forums: http://social.technet.microsoft.com/Forums/windows/en-US/home?category=w7itpro

    Thank you.

  • Of SSL VPN is not able to access from the outside

    Configuration SSL VPN, unable to access from outside, when trying to access the browser site, it says "cannot display the Page.

    Area basic firewall is configured, there must be something that I'm missing, please see the attached config.

    Any help please

    Looks like you will have to allow SSL VPN from the WAN traffic to the free zone (ZP-WAN-to-self), so you need to update the political map (PMAP-JM-WAN) in particular the ACL (ACL-VPN-PROTOCOL), must allow access to port 443 of any source IP address:

    permit tcp any  eq 443
    .. .should do the trick. Cheers, Seb.
  • SSL VPN problems with Internet Explorer

    Well, first of all, you need 64-bit to run Internet Explorer web based VPN devices in the SA500 series (we use SA540). After that we thought that out, we cannot always past SSL VPN Client install on client computers. It keeps reloading the Web page or simply nothing at all. Any ideas?

    In addition, that the CA guys do you use SSL VPN? GoDaddy certificates are not compatible, as I just discovered the hard way.

    Hi Qasim,

    The question seems to be more localized with windows blocks everything. I actually spent much time working on this yesterday to finally make it work with a 64 bit vista and a window 7 64 bit machines.

    The few details that I did have some success;

    Tools-> Internet Options-> security-> trust Sites

    • Move down
    • Disable protected mode
    • Click sites, and then add the SSL VPN page to become a member of trust
    • When adding the trusted site, uncheck 'require a server secure for all sites in this zone.

    Tools-> Internet Options-> Advanced-> Security section

    • Select "Allow downloads to run or install even if the signature is not valid"

    In addition, you must download Microsoft Visual C++ Distribution 2010 and ensure that you are running the latest version of Java.

    These are the things I had to do to allow Windows to allow me to connect. I hope it has some help for you.

    -Tom

  • Should what license I for 25 SSL VPN peers

    Hi all

    I want to implement cluster active / standby with a pair of ASAs 5550 and I have a licensing question. Here's the "sh - key retail activation" leave two output devices...

    ASA1:

    SH - activation in detail key:

    Serial number: XXXXX

    No temporary key assets.

    Activation key running: XXXXX XXXXX XXXXX XXXXX XXXXX

    The devices allowed for this platform:

    The maximum physical Interfaces: unlimited

    VLAN maximum: 250

    Internal hosts: unlimited

    Failover: Active/active

    VPN - A: enabled

    VPN-3DES-AES: enabled

    Security contexts: 2

    GTP/GPRS: disabled

    SSL VPN peers: 2

    Total of the VPN peers: 5000

    Sharing license: disabled

    AnyConnect for Mobile: disabled

    AnyConnect Cisco VPN phone: disabled

    AnyConnect Essentials: disabled

    Assessment of Advanced endpoint: disabled

    Proxy sessions for the UC phone: 2

    Total number of Sessions of Proxy UC: 2

    Botnet traffic filter: disabled

    This platform includes an ASA 5550 VPN Premium license.

    Flash activation key is the SAME as the key running.

    ASA2:

    SH - activation in detail key:

    Serial number: XXXXX

    No temporary key assets.

    Activation key running: XXXXX XXXXX XXXXX XXXXX XXXXX

    The devices allowed for this platform:

    The maximum physical Interfaces: unlimited

    VLAN maximum: 250

    Internal hosts: unlimited

    Failover: Active/active

    VPN - A: enabled

    VPN-3DES-AES: enabled

    Security contexts: 2

    GTP/GPRS: disabled

    VPN SSL counterparts: 25

    Total of the VPN peers: 5000

    Sharing license: disabled

    AnyConnect for Mobile: disabled

    AnyConnect Cisco VPN phone: disabled

    AnyConnect Essentials: disabled

    Assessment of Advanced endpoint: disabled

    Proxy sessions for the UC phone: 2

    Total number of Sessions of Proxy UC: 2

    Botnet traffic filter: disabled

    This platform includes an ASA 5550 VPN Premium license.

    Flash activation key is the SAME as the key running.

    --------------------------------------------------------------

    It seems so obvious that I have to upgrade the first ASA to support 25 SSL VPN peers in order to create the cluster HA, right?

    Now, I want to know do I need the license "ASA5505-SSL25-K9" or something else.

    Thank you very much in advance for any help!

    Ah OK I see - right then: upgading pole will allow the license to share.

    Re the version target, I would recommend going directly to 8.4 (4.1). I have it deployed on several sites without problem.

  • Where can I get a SSL VPN client?

    I don't know much about vpn technology, but used the cisco 5.x client software and the software vpn client that ships with windows xp. Now a customer asks me to connect using an ssl vpn. I don't think I can do it with either of the vpn client packages I've used before? So what am I supposed to use? I looked openvpn and couldn't make much sense out of it. I registered on this site, but apparently this is not enough for me to access the software vpn ssl client.

    Michael,

    If you are the client establishing the connection to the server RA via SSL the way that it works is using regular internet OS web browser as Internet Exprorer, as it supports SSL as webvpn SSL, and the user credentials to open a session in WEBVPN leads, that's all that you need to connect to the server of your customer RA.

    exmple to connect to the RA through webvpn would be like:

    https://

    There are two things you need as to the requirements, and I quote from the link below.

    Requirements

    Before this configuration, make sure that you follow the conditions for remote client stations:

    SSL compatible Web browser

    SUN Java JRE version 1.4 or newer

    Cookies enabled

    Blockers disabled popups

    Local administrator privileges (only not mandatory but highly recommended)

    Note: The latest version of SUN Java JRE is available as a free download from the Java Web site.

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a008072462a.shtml#PREREQ

    PLS note any useful message

    Rgds

    Jorge

  • ASA SSL VPN

    SSL VPN reliable, efficient and safe option for traffic from internet users on e-commerce sites where there may be user sessions 2000 per second from all over the world.

    Thank you.

    In my opionon - SSL is reliable, efficient and safe if not all banks around the world would not use it for online banking.

    HTH >

Maybe you are looking for