<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Anyconnect users are able to connect to subnets that are not configured for NAT0 in VPN</title>
    <link>https://community.cisco.com/t5/vpn/anyconnect-users-are-able-to-connect-to-subnets-that-are-not/m-p/3206334#M118830</link>
    <description>&lt;P&gt;If you want the users to only access certain subnets internally, you would need to create a VPN filter to specifically allow only those networks. An example for this is below:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html#anc6" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html#anc6&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Nat exemption is only needed when you have a dynamic PAT rule that users will hit by default. So if&amp;nbsp;&lt;SPAN&gt;HUDSON-STORAGE network has no PAT rule for internet access (or any other NAT rule), it will basically be passed through the ASA untranslated and to the VPN users. NAT exemption is not an effective way of blocking network access for VPN users.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 27 Oct 2017 11:13:25 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2017-10-27T11:13:25Z</dc:date>
    <item>
      <title>Anyconnect users are able to connect to subnets that are not configured for NAT0</title>
      <link>https://community.cisco.com/t5/vpn/anyconnect-users-are-able-to-connect-to-subnets-that-are-not/m-p/3206158#M118823</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've successfully configured remote access to multiple internal subnets by using NAT0 statements between the remote subnet and the internal subnets.&amp;nbsp; But I'm unable to determine the configuration that that is allowing access to our a storage subnet that is not configured for remote access?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could someone help me to identify the code that is allowing remote users on subnet 192.168.85.0/24 access to subnet 192.168.100.0/24?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface Vlan100&lt;BR /&gt;&amp;nbsp;nameif HUDSON-STORAGE&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.100.100 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network NAT0-TO-ANYCONNECT-HOST&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;object network ANYCONNECT-VPN85-HOST&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&amp;nbsp;range 192.168.85.1 192.168.85.25&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;ip local pool ANYCONNECT-VPN85-POOL 192.168.85.1-192.168.85.25 mask 255.255.255.0&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;nat (HUDSON-SECURITY,OUTSIDE-COMCAST) source static NAT0-TO-ANYCONNECT-HOST NAT0-TO-ANYCONNECT-HOST destination static ANYCONNECT-VPN85-HOST ANYCONNECT-VPN85-HOST no-proxy-arp route-lookup&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;nat (HUDSON-TV,OUTSIDE-COMCAST) source static NAT0-TO-ANYCONNECT-HOST NAT0-TO-ANYCONNECT-HOST destination static ANYCONNECT-VPN85-HOST ANYCONNECT-VPN85-HOST no-proxy-arp route-lookup&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;nat (HUDSON-SERVERS,OUTSIDE-COMCAST) source static NAT0-TO-ANYCONNECT-HOST NAT0-TO-ANYCONNECT-HOST destination static ANYCONNECT-VPN85-HOST ANYCONNECT-VPN85-HOST no-proxy-arp route-lookup&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;nat (INSIDE-VLAN4,OUTSIDE-COMCAST) source static NAT0-TO-ANYCONNECT-HOST NAT0-TO-ANYCONNECT-HOST destination static ANYCONNECT-VPN85-HOST ANYCONNECT-VPN85-HOST no-proxy-arp route-lookup&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;nat (HUDSON-KUNA,OUTSIDE-COMCAST) source dynamic HUDSON-KUNA-SUBNET interface&lt;BR /&gt;nat (HUDSON-SECURITY,OUTSIDE-COMCAST) source dynamic HUDSON-SECURITY interface&lt;BR /&gt;nat (HUDSON-SERVERS,OUTSIDE-COMCAST) source dynamic HUDSON-SERVERS interface&lt;BR /&gt;nat (INSIDE-VLAN4,OUTSIDE-COMCAST) source dynamic INSIDE-VLAN4-NETWORK interface&lt;BR /&gt;nat (HUDSON-TV,OUTSIDE-COMCAST) source dynamic HUDSON-TVs interface&lt;BR /&gt;nat (OUTSIDE-COMCAST,OUTSIDE-COMCAST) source dynamic ANYCONNECT-VPN85-HOST interface&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;group-policy ANYCONNECT-HUDSON85-GP internal&lt;BR /&gt;group-policy ANYCONNECT-HUDSON85-GP attributes&lt;BR /&gt;&amp;nbsp;dns-server value 8.8.8.8&lt;BR /&gt;&amp;nbsp;vpn-idle-timeout none&lt;BR /&gt;&amp;nbsp;vpn-session-timeout none&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 ikev2 ssl-client&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; anyconnect keep-installer installed&lt;BR /&gt;&amp;nbsp; anyconnect dpd-interval client 180&lt;BR /&gt;&amp;nbsp; anyconnect profiles value HUDSON-IKEv2-ANYCONNECT-PROFILE type user&lt;BR /&gt;&amp;nbsp; anyconnect ask none default anyconnect&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;tunnel-group ANYCONNECT-VPN85-TG type remote-access&lt;BR /&gt;tunnel-group ANYCONNECT-VPN85-TG general-attributes&lt;BR /&gt;&amp;nbsp;address-pool ANYCONNECT-VPN85-POOL&lt;BR /&gt;&amp;nbsp;default-group-policy ANYCONNECT-HUDSON85-GP&lt;BR /&gt;tunnel-group ANYCONNECT-VPN85-TG webvpn-attributes&lt;BR /&gt;&amp;nbsp;group-alias HUDSON.NET enable&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 11:40:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/anyconnect-users-are-able-to-connect-to-subnets-that-are-not/m-p/3206158#M118823</guid>
      <dc:creator>Illini79</dc:creator>
      <dc:date>2019-03-12T11:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect users are able to connect to subnets that are not configured for NAT0</title>
      <link>https://community.cisco.com/t5/vpn/anyconnect-users-are-able-to-connect-to-subnets-that-are-not/m-p/3206334#M118830</link>
      <description>&lt;P&gt;If you want the users to only access certain subnets internally, you would need to create a VPN filter to specifically allow only those networks. An example for this is below:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html#anc6" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/99103-pix-asa-vpn-filter.html#anc6&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Nat exemption is only needed when you have a dynamic PAT rule that users will hit by default. So if&amp;nbsp;&lt;SPAN&gt;HUDSON-STORAGE network has no PAT rule for internet access (or any other NAT rule), it will basically be passed through the ASA untranslated and to the VPN users. NAT exemption is not an effective way of blocking network access for VPN users.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2017 11:13:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/anyconnect-users-are-able-to-connect-to-subnets-that-are-not/m-p/3206334#M118830</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-10-27T11:13:25Z</dc:date>
    </item>
  </channel>
</rss>

