Copy of asdm-645-204.bin file to TFTP server directory. Install -> Start/restart of TFTP-server and listen on loopback interface Check connection: ASA side ciscoasa# ping 10.0.0.2 Type escape sequence to abort. Basic Configuration of ASA.
Interface GigabitEthernet0/0 description trunk mplsfe-hub g1/10 -null nameif outside security-level 0 ip address 207.171.92.25 255.255.255.252! Interface GigabitEthernet0/1 description trunk mplsfe-hub g1/11 -null no nameif no security-level no ip address! Interface GigabitEthernet0/1.231 description mplsfe-hub g1/11.231 - null V17:vpn-crs vlan 231 nameif inside security-level 100 ip address 207.171.109.173 255.255.255.252! Interface GigabitEthernet0/1.232 description mplsfe-hub g1/11.232 - null vpn-admin vlan 232 nameif vpn-admin security-level 100 ip address 207.171.120.29 255.255.255.252 This is the current config.
I have a case open with them and they aren't having any success. This is very unusual we are acting as an ISP for various agencies to SSL into the network.: ASA Version 8.4(2)! Hostname mplsfe-shpix domain-name r.state.mn.us names!
Interface GigabitEthernet0/3 shutdown no nameif no security-level no ip address! Interface Management0/0 shutdown nameif management security-level 100 ip address 10.10.10.2 255.255.255.0 management-only! Hello, I am having an issue I need to have the outside interface terminate a ssl AnyConnect Client. I have several groups the will login and I need multiple inside interfaces to satisfy my security needs. I have one group call ombudsman-mhdd and they need to go out interface g0/1.231 and another group called oet-router go out g0/1.232.
This works on my 8.2 box but I am having trouble routing traffic out these interfaces. Any help would be greatly appreciated. Interface GigabitEthernet0/0 description trunk mplsfe-hub g1/10 -null nameif outside security-level 0 ip address 207.171.92.25 255.255.255.252! Interface GigabitEthernet0/1 description trunk mplsfe-hub g1/11 -null no nameif no security-level no ip address! Interface GigabitEthernet0/1.231 description mplsfe-hub g1/11.231 - null V17:vpn-crs vlan 231 nameif inside security-level 100 ip address 207.171.109.173 255.255.255.252! Interface GigabitEthernet0/1.232 description mplsfe-hub g1/11.232 - null vpn-admin vlan 232 nameif vpn-admin security-level 100 ip address 207.171.120.29 255.255.255.252 interface GigabitEthernet0/0 description trunk mplsfe-hub g1/10 -null nameif outside security-level 0 ip address 207.171.92.25 255.255.255.252!