In order to be able to do this, we need to :
-
Create an allow rule to allow the required protocols
-
Make sure to place anonymous rules above rules that
require Authentication
-
Configure the Client as SecureNet
Configuration on ISA Server
-
Open ISA Management Console
-
Right click Firewall
Policy > Click on New >
Click on Access Rule

-
Give a name to your Access rule, I will name it
Cisco Client VPN Outbound

-
On the Rule Action page, select Allow
> Click Next

-
On the Protocols page, from the
drop down list, choose Selected Protocols
> then Click
Add

The Add Protocols Page will open,
Expand the VPN and IPsec Container

We need two protocols, the IKE Client
& The IPSec NAT-T Client , so click
on each of these protocols and click on Add, once
you add both protocols, click on Close
, Click Next

On the Access Rule Sources page, click the
Add button. In the Add Network Entities
dialog box, click on the Networks folder.
Double click on the Internal network, then
click the Close button in the Add Network
Entities dialog box. Click Next

On the Access Rule Destinations
page,
Click the Add button on the Access Rule
Destinations page. In the Add Network
Entities dialog box, click the Networks
folder. Double click the External entry and
click Close in the Add Network Entities
dialog box. Click Next .

On the User Sets page, accept the default
setting of All Users, click Next

Review your settings and click Finish on the
Completing the New Access Rule Wizard page.

Click the Apply button to save the changes
and update the firewall policy.
Configuration
on Client Machine
-
Make sure to set the Client as
SecureNet , that is the
Default Gateway for
this client should be pointing
to ISA Server Internal IP
-
If you have the Firewall Client
installed on the client machine, make sure you
disable the Firewall Client
before trying to connect using the CISCO VPN Client.
Summary
With ISA Server 2004/2006 , the protocols
require by the Cisco VPN Client are built-in under the
VPN and IPSec container, all you have to do is to create the appropriate allow rule for these protocols and
configure your client as SecureNet Client.
Now Whenever you have visitors to your Network, and they ask you to allow
them to Connect to their corporate using the Cisco VPN
Client, you will know how to do it .