I think the only way this could work is by configuring the ASA like it
was part of a VPN cluster, excluding the address from nat, then
specifying it as the cluster ip address. You may also want to specify
this new ip address as the URL for the ssl VPN. The real ip might
continue to accept connections, I've not tried this.
On Apr 23, 2010, at 6:40 AM, sairam <seekumarin_at_gmail.com> wrote:
> Dear Experts, I request your assistance.
>
> I am trying to test the SSL VPN (WEB VPN in Cisco ASA). It is working
> perfectly by default configuration. Now I am using OUTSIDE INTERFACE
> as SSL
> VPN Terminating point as below
>
> web vpn
> enable outside
>
> Is it possibe to use a differnt IP Address from the same Subnet of
> OUTSIDE
> INTERFACE, Instead of Interface IP Address itself. The Idea behind is,
> Clients should not use OUTSIDE Interface IP Address, but whereas
> they can
> use from the IP Address Pool of OUTSIDE Interface
>
> Please advice
>
> Regards and Thanks in advance
>
> sairam
Blogs and organic groups at http://www.ccie.net
Received on Fri Apr 23 2010 - 11:01:48 ART
This archive was generated by hypermail 2.2.0 : Sat May 01 2010 - 09:49:57 ART