<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Downloadable ACLs for VPN split-tunneling in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/downloadable-acls-for-vpn-split-tunneling/m-p/437119#M428308</link>
    <description>&lt;P&gt;Hello. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We know about the ipsec:inacl attribute for configuring split-tunneling for a VPN group, but AFAWK you must define the ACL in the local configuration of the router. Is it possible to define the ACL in the RADIUS server instead? How? By the way, is it possible to do the same for the IPsec pools? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you beforehand.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 21:20:59 GMT</pubDate>
    <dc:creator>jose.couto</dc:creator>
    <dc:date>2019-03-10T21:20:59Z</dc:date>
    <item>
      <title>Downloadable ACLs for VPN split-tunneling</title>
      <link>https://community.cisco.com/t5/network-access-control/downloadable-acls-for-vpn-split-tunneling/m-p/437119#M428308</link>
      <description>&lt;P&gt;Hello. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We know about the ipsec:inacl attribute for configuring split-tunneling for a VPN group, but AFAWK you must define the ACL in the local configuration of the router. Is it possible to define the ACL in the RADIUS server instead? How? By the way, is it possible to do the same for the IPsec pools? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you beforehand.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/downloadable-acls-for-vpn-split-tunneling/m-p/437119#M428308</guid>
      <dc:creator>jose.couto</dc:creator>
      <dc:date>2019-03-10T21:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: Downloadable ACLs for VPN split-tunneling</title>
      <link>https://community.cisco.com/t5/network-access-control/downloadable-acls-for-vpn-split-tunneling/m-p/437120#M428312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The following steps to be followed for spit tunnelling&lt;/P&gt;&lt;P&gt;Set the split tunneling policy to only tunnel networks in the list. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configure network lists and default domain names in the Common Client Parameters section of this screen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Change the default setting on the client PC's Internet Protocol (TCP/IP) Properties window. Go to Control Panel &amp;gt; Network Connections &amp;gt; VPN &amp;gt; VPN Properties &amp;gt; Networking &amp;gt; Internet Protocol (TCP/IP) &amp;gt; Select Properties &amp;gt; Internet Protocol (TCP/IP) Properties window. Select Advanced and uncheck the box.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: If you enable both split tunneling and individual user authentication for a VPN 3002 Hardware Client, you must authenticate only when sending traffic bound for destinations on the other side of the IPSec tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Oct 2005 17:50:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/downloadable-acls-for-vpn-split-tunneling/m-p/437120#M428312</guid>
      <dc:creator>smahbub</dc:creator>
      <dc:date>2005-10-26T17:50:58Z</dc:date>
    </item>
  </channel>
</rss>

