- Internet user connects Clientless SSL, Anyconnect SSL, IPsec RA VPN to the inside network(192.168.0.0/24) of HQ.
- HQ and BO communicate with secured connection
- All network users should be able to access internet.(192.168.0.0/24, internet user, and 192.168.100.0/24)
Requirements:
- Two ASAs
- HQ inside network and servers for inside users.
- The services are Web, FTP, SSH, RDP and VNC.
Special Requirements(optional)
- DNS and Root Certificate Authority server.
- ASA on HQ have certificate issued by CA server(Windows 2008 R2 server)
- All computers have installed CA root certificate to "Trusted Root Certificate Authorities."
The domain name of ASA is "remote.mgk.com."
1. A internet computer connects Clientless VPN.
Launching Clientless SSL VPN
Remote Desktop Access is successful.
VNC, SSH(putty), inside web and FTP servers are successful as well.
2. Anyconnect SSL VPN
Launching Anyconnect SSL VPN
Connected
Connect to SSH server(192.168.0.2/24)
Successful.(RDP, VNC, inside Web and FTP are as well)
3. IPsec RA VPN
Launching legacy VPN Client
Connecting to 192.168.0.0/24 is successful.
VNC connection is successful.(the others are also successful.)
4. Site-to-site VPN
* 192.168.100.2/24 host connects to Web and FTP server (192.168.0.2/24 )
All the others are working fine.
No comments:
Post a Comment