{"id":2832,"date":"2026-01-10T23:48:00","date_gmt":"2026-01-10T23:48:00","guid":{"rendered":"https:\/\/www.balajibandi.com\/?p=2832"},"modified":"2026-01-29T17:53:14","modified_gmt":"2026-01-29T17:53:14","slug":"93-days-to-ccie-sec-v6-1-lab","status":"publish","type":"post","link":"https:\/\/www.balajibandi.com\/?p=2832","title":{"rendered":"93 Days to CCIE SEC v6.1 Lab"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">AnyConnect Remote Access VPN on ASA1v \/ ASA11v<\/mark><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">ISE + Active Directory Authentication, ASA DHCP Pool, and ISE DACL-Based Authorization<\/h3>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Cisco Remote Access VPN<\/mark><\/strong><\/p>\n\n\n\n<p>A Remote Access VPN extends a private corporate network across a public infrastructure (the Internet). Unlike a Site-to-Site VPN, which connects two fixed locations, a Remote Access VPN allows\u00a0<strong>individual users<\/strong>\u00a0to establish a secure, encrypted &#8220;tunnel&#8221; from any location using a software client like\u00a0Cisco AnyConnect Secure Mobility Client.<\/p>\n\n\n\n<p>The VPN client (for example, Cisco AnyConnect) establishes an <strong>encrypted tunnel<\/strong> to a VPN headend (ASA, Firepower, or Secure Firewall), ensuring confidentiality, integrity, and user authentication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">How Remote Access VPN Works (High-Level Flow)<\/mark><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>User launches the VPN client (AnyConnect)<\/li>\n\n\n\n<li>Client establishes a secure tunnel to the VPN gateway<\/li>\n\n\n\n<li>User authenticates (credentials, certificates, or MFA)<\/li>\n\n\n\n<li>VPN gateway assigns:\n<ul class=\"wp-block-list\">\n<li>IP address<\/li>\n\n\n\n<li>DNS settings<\/li>\n\n\n\n<li>Security policies<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>User traffic is encrypted and forwarded into the enterprise network<\/li>\n<\/ol>\n\n\n\n<p>From a networking perspective, the remote user becomes a <strong>logical extension of the internal network<\/strong>, subject to routing, NAT, and firewall policies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">VPN Tunnel Types Used in Remote Access<\/mark><\/h2>\n\n\n\n<p>Cisco AnyConnect supports multiple tunnel mechanisms:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SSL\/TLS VPN<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Uses TCP\/443<\/li>\n\n\n\n<li>Works through most firewalls<\/li>\n\n\n\n<li>Ideal for Internet-based access<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">IKEv2\/IPsec<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Strong cryptography<\/li>\n\n\n\n<li>Efficient control plane<\/li>\n\n\n\n<li>Often combined with SSL for fallback<\/li>\n<\/ul>\n\n\n\n<p>Modern deployments typically use: <strong>SSL + IKEv2 with DTLS for performance<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Control Plane vs Data Plane<\/mark> <\/h2>\n\n\n\n<p>A Remote Access VPN consists of two logical planes:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Control Plane<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>User authentication<\/li>\n\n\n\n<li>Authorization decisions<\/li>\n\n\n\n<li>Tunnel establishment<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Data Plane<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Encrypted user traffic<\/li>\n\n\n\n<li>Policy enforcement (ACLs, DACLs)<\/li>\n\n\n\n<li>NAT and routing decisions<\/li>\n<\/ul>\n\n\n\n<p>In advanced designs (like the one in this blog), <strong>authentication and authorisation are offloaded to Cisco ISE<\/strong>, while <strong>enforcement remains on the ASA<\/strong>.<\/p>\n\n\n\n<p>Cisco AnyConnect Remote Access VPN remains a cornerstone technology in enterprise remote access designs. While modern Zero Trust solutions are evolving rapidly, <strong>ASA + AnyConnect + ISE + AD<\/strong> is still widely deployed and extremely relevant for <strong>CCIE Security\u2013level understanding<\/strong> of:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Authentication vs Authorization separation<\/li>\n\n\n\n<li>AAA control-plane design<\/li>\n\n\n\n<li>Dynamic access enforcement using <strong>Downloadable ACLs (DACLs)<\/strong><\/li>\n\n\n\n<li>Real-world VPN policy enforcement<\/li>\n<\/ul>\n\n\n\n<p>This blog walks through a <strong>complete deployment<\/strong> using:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>ASA1v \/ ASA11v<\/strong> (enforcement)<\/li>\n\n\n\n<li><strong>Cisco ISE<\/strong> for authentication and authorisation (policy brain)<\/li>\n\n\n\n<li><strong>Microsoft Active Directory<\/strong> as the identity store<\/li>\n\n\n\n<li><strong>DHCP address assignment from the ASA<\/strong><\/li>\n\n\n\n<li><strong>ISE DACLs<\/strong> to allow access to <strong>only specific internal sites<\/strong><\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li>ASA Base Configuration<\/li>\n<\/ol>\n\n\n\n<p>interface GigabitEthernet0\/0<br>nameif outside<br>security-level 0<br>ip address 192.168.100.2 255.255.255.0<\/p>\n\n\n\n<p>interface GigabitEthernet0\/1<br>nameif inside<br>security-level 100<br>ip address 10.10.10.1 255.255.255.0<\/p>\n\n\n\n<p> 2. Routing<\/p>\n\n\n\n<p>route outside 0.0.0.0 0.0.0.0 192.168.100.1<\/p>\n\n\n\n<p>3. AnyConnect WebVPN Configuration<\/p>\n\n\n\n<p>webvpn<br>enable outside<br>anyconnect image disk0:\/anyconnect-win-4.x.x-k9.pkg 1<br>anyconnect enable<\/p>\n\n\n\n<p>4. DHCP Pool on ASA (VPN Clients)<\/p>\n\n\n\n<p>The ASA acts as a <strong>DHCP server<\/strong> for VPN clients.<\/p>\n\n\n\n<p>ip local pool AC_POOL 10.20.20.10-10.20.20.100 mask 255.255.255.0<\/p>\n\n\n\n<p>5. Group Policy (Minimal \u2013 DACL Will Enforce Access)<\/p>\n\n\n\n<p><strong>No split tunnel ACL<\/strong> \u2014 access will be controlled via ISE DACL<\/p>\n\n\n\n<p>group-policy GP_ANYCONNECT internal<br>group-policy GP_ANYCONNECT attributes<br>vpn-tunnel-protocol ssl-client ikev2<\/p>\n\n\n\n<p>6. Tunnel Group Configuration<\/p>\n\n\n\n<p>tunnel-group AC_VPN type remote-access<\/p>\n\n\n\n<p>tunnel-group AC_VPN general-attributes<br>address-pool AC_POOL<br>default-group-policy GP_ANYCONNECT<br>authentication-server-group ISE<\/p>\n\n\n\n<p>tunnel-group AC_VPN webvpn-attributes<br>group-alias AnyConnect enable<\/p>\n\n\n\n<p>ASA\u2013ISE Integration<\/p>\n\n\n\n<p>aaa-server ISE protocol radius<br>aaa-server ISE (inside) host 10.10.10.50<br>key radius123<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Join ISE to Active Directory<\/mark><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Administration \u2192 Identity Management \u2192 External Identity Sources \u2192 AD<\/li>\n\n\n\n<li>Join domain (e.g. <code>lab.local<\/code>)<\/li>\n\n\n\n<li>Verify successful join<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Add ASA as Network Device<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Administration \u2192 Network Devices<\/li>\n\n\n\n<li>Add ASA IP<\/li>\n\n\n\n<li>Enable <strong>RADIUS Authentication Settings<\/strong><\/li>\n\n\n\n<li>Configure shared secret<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">ISE Downloadable ACL (DACL)<\/mark><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Example Requirement<\/h3>\n\n\n\n<p>Allow VPN users to access <strong>only<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Internal Web Server: <code>10.10.10.100<\/code><\/li>\n\n\n\n<li>Internal DNS: <code>10.10.10.10<\/code><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">DACL Configuration<\/h3>\n\n\n\n<p><strong>Policy \u2192 Policy Elements \u2192 Results \u2192 Authorization \u2192 Downloadable ACLs<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>permit tcp any host 10.10.10.100 eq 443\npermit udp any host 10.10.10.10 eq 53\npermit tcp any host 10.10.10.10 eq 53\ndeny ip any any<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">ISE Authorization Policy<\/mark><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>IF\n  AD-Group = VPN_Users_Limited\nTHEN\n  PermitAccess\n  Apply DACL = VPN_LIMITED_DACL\n<\/code><\/pre>\n\n\n\n<p>&#x1f4a1; Authentication still succeeds, but <strong>access is restricted dynamically<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">NAT Configuration (Critical)<\/mark><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">NAT Exemption (Inside &#x2194; VPN Pool)<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>object network INSIDE_NET\n subnet 10.10.10.0 255.255.255.0\n\nobject network VPN_POOL\n subnet 10.20.20.0 255.255.255.0\n\nnat (inside,outside) source static INSIDE_NET INSIDE_NET destination static VPN_POOL VPN_POOL<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Outside Interface ACL<\/mark><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>access-list OUTSIDE_IN permit tcp any host 203.0.113.10 eq 443\naccess-group OUTSIDE_IN in interface outside\n\nEnd-to-End Connection Flow (Deep Dive)\n\nAnyConnect client connects to ASA\n\nASA forwards credentials to ISE\n\nISE authenticates user against AD\n\nISE returns:\n\nAccess-Accept\n\nDACL name\n\nASA:\n\nAssigns IP from DHCP pool\n\nApplies DACL dynamically\n\nTraffic is filtered per-user<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Validation &amp; Testing<\/mark><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">On ASA<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>show vpn-sessiondb anyconnect\nshow aaa-server ISE\nshow access-list\n\nLook for:<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>DACL applied to session<\/li>\n\n\n\n<li>Correct IP assignment<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">On ISE<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Operations \u2192 RADIUS \u2192 Live Logs<\/li>\n\n\n\n<li>Confirm:\n<ul class=\"wp-block-list\">\n<li>Authentication = AD<\/li>\n\n\n\n<li>Authorization Profile = DACL<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Troubleshooting <\/mark><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">ASA Debugs<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>debug webvpn 255\ndebug radius 255\ndebug aaa authentication\n\n<strong>Happy Labinggggggggggggggggggggggg !<\/strong><\/code><\/pre>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AnyConnect Remote Access VPN on ASA1v \/ ASA11v ISE + Active Directory Authentication, ASA DHCP Pool, and ISE DACL-Based Authorization Cisco Remote Access VPN A Remote Access VPN extends a private corporate network across a public infrastructure (the Internet). Unlike a Site-to-Site VPN, which connects two fixed locations, a Remote Access VPN allows\u00a0individual users\u00a0to establish [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,2],"tags":[],"class_list":["post-2832","post","type-post","status-publish","format-standard","hentry","category-ccie-sec","category-cisco"],"_links":{"self":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts\/2832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2832"}],"version-history":[{"count":2,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts\/2832\/revisions"}],"predecessor-version":[{"id":2834,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=\/wp\/v2\/posts\/2832\/revisions\/2834"}],"wp:attachment":[{"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.balajibandi.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}