Cisco Cisco ASA for Nexus 1000V Series Switch Technisches Handbuch

Seite von 25
ASA 7.1/7.2: Allow Split Tunneling for SVC on the
ASA Configuration Example
Document ID: 100925
Contents
Introduction
 Prerequisites
      Requirements
      Components Used
      Conventions
 Background Information
 Configure
      Network Diagram
ASA Configurations Using ASDM 5.2(2)
ASA 7.2(2) Configuration Using CLI
      Establish the SSL VPN Connection with SVC
 Verify
 Troubleshoot
 Related Information
Introduction
This document provides step−by−step instructions on how to allow Secure Socket Layer (SSL) VPN Clients
(SVC) access to the Internet while they are tunneled into a Cisco Adaptive Security Appliance (ASA). This
configuration allows SVC secure access to corporate resources through SSL and gives unsecured access to the
Internet with the use of split tunneling.
The ability to transmit both secured and unsecured traffic on the same interface is known as split tunneling.
Split tunneling requires that you specify exactly which traffic is secured and what the destination of that
traffic is, so that only the specified traffic enters the tunnel, while the rest is transmitted unencrypted across
the public network (Internet).
Prerequisites
Requirements
Ensure that you meet these requirements before you attempt this configuration:
Local administrative privileges on all remote workstations
• 
Java and ActiveX controls on the remote workstation
• 
Port 443(SSL) is not blocked anywhere along the connection path
• 
Components Used
The information in this document is based on these software and hardware versions:
Cisco 5500 Series Adaptive Security Appliance (ASA) that runs software version 7.2(2)
• 
Cisco SSL VPN Client version for Windows 1.1.4.179
•