?
Solved

Cisco SSL Smart tunnel

Posted on 2014-03-26
5
Medium Priority
?
87 Views
Last Modified: 2015-09-26
I have a URL published on Internet & this will be accessed via the Smart Tunnel of SSL VPN published in Cisco ASA.

When i access from Internet it works fine. But when I access it via by office LAN through proxy it is not working fine.

Would like to know to access the SMART tunnel VPN via proxy does any changes or any feature needs to be enabled in the proxy.
Does smart tunnel VPN works under proxy env & if so is there any document by which we can achieve this...
0
Comment
Question by:SrikantRajeev
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 16

Expert Comment

by:Michael Ortega
ID: 39955852
Are you trying to setup your client based SSL VPN connection from within a private network that has a site to site VPN to the same remote VPN endpoint?

MO
0
 
LVL 1

Author Comment

by:SrikantRajeev
ID: 39955994
I am using Clientless SSL VPN using SMART tunneling.
0
 
LVL 16

Accepted Solution

by:
Michael Ortega earned 2000 total points
ID: 39956105
If you're HTTPS traffic is going through an external proxy then this might be an issue. Have you tried without using the proxy?

MO
0
 
LVL 1

Author Comment

by:SrikantRajeev
ID: 39964494
Without proxy it is working.
But If i want to go through proxy what is the option ?
Also what traffic  will be flowing through the Split tunneling ?
Will all the traffic or only specific traffic.
0
 
LVL 1

Author Closing Comment

by:SrikantRajeev
ID: 41006429
Thanks
0

Featured Post

Limited time offer using promo code EXPERTS30

Designed with a wealth of functionality and convenience, ATEN's new Thunderbolt™ 2 Sharing Switch takes your Thunderbolt setup to the next level. Now through September 15, 2017, Experts Exchange members get 30% off the US7220 on the ATEN USA eShop using promo code EXPERTS30.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month13 days, 5 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question