<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Route Remote VPN users back out Firewall for specific Subnets in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/route-remote-vpn-users-back-out-firewall-for-specific-subnets/m-p/4758172#M1096997</link>
    <description>&lt;P&gt;there are different between asa and ftd, asa allow vpn by default,&lt;/P&gt;&lt;P&gt;ftd need allow acl for vpn.&lt;/P&gt;</description>
    <pubDate>Fri, 20 Jan 2023 11:23:39 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-01-20T11:23:39Z</dc:date>
    <item>
      <title>Route Remote VPN users back out Firewall for specific Subnets</title>
      <link>https://community.cisco.com/t5/network-security/route-remote-vpn-users-back-out-firewall-for-specific-subnets/m-p/4758169#M1096996</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;Currently trying to enable our Remote VPN users to route through our primary site and back out for specific subnets. We're using a FTD 2110 running 6.6.5 managed by an FMC running 6.6.5.2&lt;/P&gt;&lt;P&gt;i added the desired subnets to the split-tunnel ACL and added a few variants of NAT (OUTSIDE VPN subnet to OUTSIDE subnet)&lt;/P&gt;&lt;P&gt;I've gotten to this to work on our ASA with hairpinning before but not sure how the FTD handles it.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2023 22:05:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-remote-vpn-users-back-out-firewall-for-specific-subnets/m-p/4758169#M1096996</guid>
      <dc:creator>cparkelnp</dc:creator>
      <dc:date>2023-01-19T22:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: Route Remote VPN users back out Firewall for specific Subnets</title>
      <link>https://community.cisco.com/t5/network-security/route-remote-vpn-users-back-out-firewall-for-specific-subnets/m-p/4758172#M1096997</link>
      <description>&lt;P&gt;there are different between asa and ftd, asa allow vpn by default,&lt;/P&gt;&lt;P&gt;ftd need allow acl for vpn.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 11:23:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-remote-vpn-users-back-out-firewall-for-specific-subnets/m-p/4758172#M1096997</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-01-20T11:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: Route Remote VPN users back out Firewall for specific Subnets</title>
      <link>https://community.cisco.com/t5/network-security/route-remote-vpn-users-back-out-firewall-for-specific-subnets/m-p/4758488#M1096999</link>
      <description>&lt;P&gt;Hi ,&lt;BR /&gt;&lt;BR /&gt;Could you please confirm on the following points if you have already configured?&lt;BR /&gt;&lt;BR /&gt;1- Did you bypass the NAT rules for Remote Access VPN's traffic ? ( NAT Exemption should be there for the source or inside interface)&lt;BR /&gt;2- Did you ensure the routing of the traffic ? Is it colliding with any other routes in the table and not taking the precedence?&lt;BR /&gt;3- Is your DNS flow complete and configured correctly?&lt;BR /&gt;4- For split tunneling, you need to by pass the irrelevant traffic and pass only the intended traffic to the specific internal network via the tunnel.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 07:15:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-remote-vpn-users-back-out-firewall-for-specific-subnets/m-p/4758488#M1096999</guid>
      <dc:creator>Syed Hassan Shah</dc:creator>
      <dc:date>2023-01-20T07:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: Route Remote VPN users back out Firewall for specific Subnets</title>
      <link>https://community.cisco.com/t5/network-security/route-remote-vpn-users-back-out-firewall-for-specific-subnets/m-p/4758674#M1097006</link>
      <description>&lt;P&gt;Without seeing your configuration it is difficult to pinpoint where the issue is.&amp;nbsp; But a few things to verify you have configured correctly:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;verify that the twice NAT statement is correct, i.e. the source and destination translations are correct, or that the dynamic NAT for the VPN users is correct.&lt;/LI&gt;
&lt;LI&gt;verify if you need to add an access-list to allow this traffic. on the CLI issue the command &lt;STRONG&gt;show run sysopt&lt;/STRONG&gt;&amp;nbsp; If this is disabled (no sysopt connection permit-vpn) then you need to add an access-list allowing this VPN traffic on the outside interface.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 20 Jan 2023 12:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-remote-vpn-users-back-out-firewall-for-specific-subnets/m-p/4758674#M1097006</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-01-20T12:17:10Z</dc:date>
    </item>
  </channel>
</rss>

