• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1623
  • Last Modified:

Use ASA SSL VPN in one-armed mode

I have a LAN that is behind a Juniper SSG550M firewall. I also have an ASA-5505 that I want to use strictly as a Client-based SSL VPN server. It has only one interface configured (inside)  as I need it to work in one-armed mode. I have a one-to-one NAT configured on the Juniper for the ASA's IP address and everything allowed to it. All of the routing is configured correctly. For some reason I cannot ping anythign inside the LAN from the outside. I know it isn't a problem with the SSL VPN copnfiguration because I can actually establish a connection to the ASA from the outside via SSL and if I configure this in the traditional manner with an inside and outside interface and NAT it works. Was the ASA designed to work in this fasion? Is there something special I need to do?
0
sschuessler
Asked:
sschuessler
1 Solution
 
Pete LongTechnical ConsultantCommented:
Have you allowed traffic from your internal network to the remote IP pool in use on your SSL VPN?
Is there a static NAT translation for the above?
If so and you can reach the portal and Anyconnect will connect that should be all you need to do :)
0

Featured Post

The 14th Annual Expert Award Winners

The results are in! Meet the top members of our 2017 Expert Awards. Congratulations to all who qualified!

Tackle projects and never again get stuck behind a technical roadblock.
Join Now