Cisco Cisco ASA for Nexus 1000V Series Switch 기술 매뉴얼
ASA 8.x: VPN Access with the AnyConnect VPN
Client Using Self−Signed Certificate Configuration
Example
Client Using Self−Signed Certificate Configuration
Example
Document ID: 99756
Contents
Introduction
Prerequisites
Requirements
Components Used
Conventions
Background Information
Configure
Step 1. Configure a Self−Issued Certificate
Step 2. Upload and Identify the SSL VPN Client Image
Step 3. Enable Anyconnect Access
Step 4. Create a new Group Policy
Configure Access List Bypass for VPN Connections
Step 6. Create a Connection Profile and Tunnel Group for the AnyConnect Client Connections
Step 7. Configure NAT Exemption for AnyConnect Clients
Step 8. Add Users to the Local Database
Verify
Troubleshoot
Prerequisites
Requirements
Components Used
Conventions
Background Information
Configure
Step 1. Configure a Self−Issued Certificate
Step 2. Upload and Identify the SSL VPN Client Image
Step 3. Enable Anyconnect Access
Step 4. Create a new Group Policy
Configure Access List Bypass for VPN Connections
Step 6. Create a Connection Profile and Tunnel Group for the AnyConnect Client Connections
Step 7. Configure NAT Exemption for AnyConnect Clients
Step 8. Add Users to the Local Database
Verify
Troubleshoot
Troubleshooting Commands (Optional)
Related Information
Related Information
Introduction
This document describes how to use self−signed certificates to allow remote access SSL VPN connections to
the ASA from the Cisco AnyConnect 2.0 client.
the ASA from the Cisco AnyConnect 2.0 client.
Prerequisites
Requirements
Ensure that you meet these requirements before you attempt this configuration:
Basic ASA configuration that runs software version 8.0
•
ASDM 6.0(2)
•
Components Used
The information in this document is based on these software and hardware versions:
Cisco ASA 8.0(2), ASDM 6.0 (2)
•
Cisco AnyConnect 2.0
•