Tuesday, August 5, 2014

Varify all configuration: Clientless SSL VPN, Anyconnect SSL VPN, IPsec RA VPN, IPsec Site-to-site VPN





  1. Internet user connects Clientless SSL, Anyconnect SSL, IPsec RA VPN to the inside network(192.168.0.0/24) of HQ.
  2. HQ and BO communicate with secured connection
  3. All network users should be able to access internet.(192.168.0.0/24, internet user, and 192.168.100.0/24)

Requirements:

  • Two ASAs
  • HQ inside network and servers for inside users.
  • The services are Web, FTP, SSH, RDP and VNC.

Special Requirements(optional)

  • DNS and Root Certificate Authority server.
  • ASA on HQ have certificate issued by CA server(Windows 2008 R2 server)

    The domain name of ASA is "remote.mgk.com."

  • All computers have installed CA root certificate to "Trusted Root Certificate Authorities."


1. A internet computer connects Clientless VPN.


Launching Clientless SSL VPN


Remote Desktop Access is successful.

VNC, SSH(putty), inside web and FTP servers are successful as well.

2. Anyconnect SSL VPN


Launching Anyconnect SSL VPN


Connected

Connect to SSH server(192.168.0.2/24)

Successful.(RDP, VNC, inside Web and FTP are as well)

3. IPsec RA VPN


Launching legacy VPN Client
 Connecting to 192.168.0.0/24 is successful.
 VNC connection is successful.(the others are also successful.)

4. Site-to-site VPN


* 192.168.100.2/24 host connects to Web and FTP server (192.168.0.2/24 )


All the others are working fine.

No comments:

Post a Comment