<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Anyconnect with Excluded split tunneling plus local LAN ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4190705#M1076266</link>
    <description>&lt;P&gt;The config you use to apply the firewall rules are meant to control the local host-firewall on the PC.&lt;/P&gt;
&lt;P&gt;To control which traffic is allowed through the tunnel, you have to apply the ACL as a vpn-filter:&lt;/P&gt;
&lt;PRE&gt;group-policy GrpPolicy-XXXXXX attributes
 vpn-filter value Network_ACL_Allow_SWLT_Printers&lt;/PRE&gt;</description>
    <pubDate>Mon, 30 Nov 2020 12:53:20 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2020-11-30T12:53:20Z</dc:date>
    <item>
      <title>Cisco Anyconnect with Excluded split tunneling plus local LAN ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4190653#M1076257</link>
      <description>&lt;P&gt;Hello Cisco Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm facing a problem in my Anyconnect setup:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Context: VPN connectivity based on Cisco Anyconnect client 4.9.01095 + Cisco ASAv 9.12(4)7&lt;/P&gt;&lt;P&gt;Problem:&lt;/P&gt;&lt;P&gt;my setup requires split tunneling to exclude cloud services from the VPN tunnel and access to the local LAN on specific port (for local printing plus access to specific resources - need an ACL to protect what is granted)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't make it:&lt;/P&gt;&lt;P&gt;- the client profile has the option "Local Lan Access" enabled&lt;/P&gt;&lt;P&gt;- I've added the 0.0.0.0/32 (in addition to other cloud services) in my split-tunneling extended ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;----------------------&lt;/P&gt;&lt;P&gt;access-list Split-tunneling-excluded-networks remark Exclude Zscaler nodes from VPN&lt;BR /&gt;access-list Split-tunneling-excluded-networks remark Source IPs are taken into account (Destination IPs are ignored&lt;BR /&gt;access-list Split-tunneling-excluded-networks extended permit ip object-group Grp_Zscaler_nodes any&lt;BR /&gt;access-list Split-tunneling-excluded-networks extended permit ip object-group Grp_Webex_networks any&lt;BR /&gt;access-list Split-tunneling-excluded-networks remark Exclude Zscaler nodes from VPN&lt;BR /&gt;access-list Split-tunneling-excluded-networks extended permit ip object-group Grp_Teams_networks any&lt;BR /&gt;access-list Split-tunneling-excluded-networks remark Local access&lt;BR /&gt;access-list Split-tunneling-excluded-networks extended permit ip host 0.0.0.0 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;------------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- I've configured this ACL to be used as Excluded in the group policy:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;group-policy GrpPolicy-XXXXXX attributes&lt;/P&gt;&lt;P&gt;split-tunnel-policy excludespecified&lt;/P&gt;&lt;P&gt;&amp;nbsp;split-tunnel-network-list value Split-tunneling-excluded-networks&lt;/P&gt;&lt;P&gt;&amp;nbsp;split-tunnel-all-dns disable&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;=&amp;gt; at this point, my split tunneling is working fine, including access to the entire local LAN (route details in the client is showing all my cloud service networks + my local LAN in the Non-secured route section)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I'm trying to add on top of this setup a specific ACL to restrict the access on local LAN to specific IPs/Ports:&lt;/P&gt;&lt;P&gt;- I've created a specific extended ACL to filter some IPs:&lt;/P&gt;&lt;P&gt;------------------&lt;/P&gt;&lt;P&gt;access-list Network_ACL_Allow_SWLT_Printers extended permit ip any4 object home-server-test&lt;/P&gt;&lt;P&gt;access-list Network_ACL_Allow_SWLT_Printers extended deny ip any4 object home-network-test&lt;/P&gt;&lt;P&gt;access-list Network_ACL_Allow_SWLT_Printers extended permit ip any4 object-group DM_INLINE_NETWORK_4&lt;/P&gt;&lt;P&gt;-------------------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- I'm using this ACL in the client firewall section of the group policy on the public Network rule:&lt;/P&gt;&lt;P&gt;group-policy GrpPolicy-XXXXXX attributes&lt;/P&gt;&lt;P&gt;split-tunnel-policy excludespecified&lt;/P&gt;&lt;P&gt;&amp;nbsp;split-tunnel-network-list value Split-tunneling-excluded-networks&lt;/P&gt;&lt;P&gt;&amp;nbsp;split-tunnel-all-dns disable&amp;nbsp;&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect firewall-rule client-interface public value Network_ACL_Allow_SWLT_Printers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;=&amp;gt; Doing this, my split-tunneling configuration disappears!&lt;/P&gt;&lt;P&gt;=&amp;gt; If I choose the Built-in local printing ACL proposed by ASDM, it has no effect: split tunneling is working fine but the local LAN access is not filtered by this ACL (meaning full access ok).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there anything I miss ? is what I try to achieve possible ?&lt;/P&gt;&lt;P&gt;Thank you for your help,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Robin&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2020 11:29:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4190653#M1076257</guid>
      <dc:creator>RobinT73196</dc:creator>
      <dc:date>2020-11-30T11:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Anyconnect with Excluded split tunneling plus local LAN ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4190705#M1076266</link>
      <description>&lt;P&gt;The config you use to apply the firewall rules are meant to control the local host-firewall on the PC.&lt;/P&gt;
&lt;P&gt;To control which traffic is allowed through the tunnel, you have to apply the ACL as a vpn-filter:&lt;/P&gt;
&lt;PRE&gt;group-policy GrpPolicy-XXXXXX attributes
 vpn-filter value Network_ACL_Allow_SWLT_Printers&lt;/PRE&gt;</description>
      <pubDate>Mon, 30 Nov 2020 12:53:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4190705#M1076266</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2020-11-30T12:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Anyconnect with Excluded split tunneling plus local LAN ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4190710#M1076268</link>
      <description>&lt;P&gt;Hello Karsten,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for your reply. I'm not trying to filter the traffic going inside the VPN (this traffic will be controled at another security layer), but the traffic reaching the local LAN. That's why I'm trying to us the local-host firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Robin&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2020 13:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4190710#M1076268</guid>
      <dc:creator>RobinT73196</dc:creator>
      <dc:date>2020-11-30T13:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Anyconnect with Excluded split tunneling plus local LAN ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4191045#M1076299</link>
      <description>&lt;P&gt;access-list ALL_EXCEPT permit host 0.0.0.0&lt;BR /&gt;access-list ALL_EXCEPT permit 192.168.1.0 0.0.0.0&amp;lt; this will excluded&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;group-policy attributes&lt;BR /&gt;split-tunnel-policy exclude specified&lt;BR /&gt;split-tuunel-netowrk-list value ALL_EXCEPT&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;try the above config&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2020 23:38:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4191045#M1076299</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2020-11-30T23:38:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Anyconnect with Excluded split tunneling plus local LAN ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4191259#M1076310</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for your reply. Maybe I'm wrong but I don't see the point of doing this:&lt;/P&gt;&lt;P&gt;- the first line "access-list ALL_EXCEPT permit host 0.0.0.0" purpose is to allow access in local (out of the VPN) to the local networks, in a dynamic way which is perfect for me&lt;/P&gt;&lt;P&gt;- the second line "access-list ALL_EXCEPT permit 192.168.1.0 0.0.0.0" is doing the same, but not in a dynamic way. Hence, it won't cover all my use cases.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, this part is working. What is not is the combination of this split-tunneling setup with the ACL on the local client firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Robin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2020 10:17:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4191259#M1076310</guid>
      <dc:creator>RobinT73196</dc:creator>
      <dc:date>2020-12-01T10:17:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Anyconnect with Excluded split tunneling plus local LAN ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4193506#M1076416</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any idea regarding to solve the "combination of this split-tunneling setup with the ACL on the local client firewall" ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Robin&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 15:10:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4193506#M1076416</guid>
      <dc:creator>RobinT73196</dc:creator>
      <dc:date>2020-12-04T15:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Anyconnect with Excluded split tunneling plus local LAN ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4193993#M1076445</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/70847-local-lan-pix-asa.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/70847-local-lan-pix-asa.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;solution I hope.&lt;BR /&gt;but this local LAN not through the VPN tunnel just want to make you notice this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Dec 2020 17:37:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4193993#M1076445</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2020-12-05T17:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Anyconnect with Excluded split tunneling plus local LAN ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4194376#M1076474</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for your reply. Unfortunately, it doesn't cover all my need: this link is to configure access to the local LAN and provide FULL access to the LAN. In my context, I need to be able to filter it (so probably with local client ACL) and to have split-tunnelling for cloud services. This entire setup, I cannot achieve to make it ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Robin&lt;/P&gt;</description>
      <pubDate>Mon, 07 Dec 2020 08:28:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-anyconnect-with-excluded-split-tunneling-plus-local-lan/m-p/4194376#M1076474</guid>
      <dc:creator>RobinT73196</dc:creator>
      <dc:date>2020-12-07T08:28:09Z</dc:date>
    </item>
  </channel>
</rss>

