<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: remote access vpn traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-access-vpn-traffic/m-p/4924030#M1104269</link>
    <description>&lt;P&gt;You need to configure the RAVPN to be tunnel-all and not split-tunnel.&amp;nbsp; In addition to this you will need a NAT statement that will translate RAVPN users to the outside interface IP (or another public IP).&amp;nbsp; so the nat statement would have source interface outside, destination interface outside. Also, depending on if you have set up RAVPN to bypass the interface ACL or not, you might need to allow access from the RAVPN subnet to any / internet.&lt;/P&gt;
&lt;P&gt;You can refer to the following link for more information on setting up RAVPN.&amp;nbsp; But as you have this already set up you might just want to focus on the "hair-pinning" part.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215875-configure-anyconnect-vpn-client-on-ftd.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215875-configure-anyconnect-vpn-client-on-ftd.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 15 Sep 2023 10:19:52 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2023-09-15T10:19:52Z</dc:date>
    <item>
      <title>remote access vpn traffic</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-traffic/m-p/4923202#M1104235</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;I have remote access vpn (Local) to my origination and its working fine .&amp;nbsp;&lt;/P&gt;&lt;P&gt;how I can achieve this&amp;nbsp; after Rvpn connected , the internet from my client pc should be route via my organization. i mean all traffic from my client pc should go via origination .&lt;/P&gt;&lt;P&gt;can i get any solution please to achieve this please ...&lt;/P&gt;&lt;P&gt;my os version is 7.0.2&amp;nbsp; cisco firepower also managing from fmc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Sep 2023 06:18:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-traffic/m-p/4923202#M1104235</guid>
      <dc:creator>ShareefKooliyodan0444</dc:creator>
      <dc:date>2023-09-14T06:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: remote access vpn traffic</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-traffic/m-p/4924024#M1104267</link>
      <description>&lt;P&gt;Shareef,&lt;/P&gt;&lt;P&gt;Most likely this is an issue with your tunnel setting on the RA VPN.&amp;nbsp; If you want all traffic to go through your organization, you have to select that in the connection profile of your VPN.&amp;nbsp; Go to Devices&amp;gt;Remote Access.&amp;nbsp; From there, click on the connection profile you want to edit and then click on edit group policy.&amp;nbsp; On the group policy screen, you will find the split tunnel information under "General."&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dwillia5highpointedu_0-1694772136402.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/197347i0E9D56170B524AF6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dwillia5highpointedu_0-1694772136402.png" alt="dwillia5highpointedu_0-1694772136402.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 10:02:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-traffic/m-p/4924024#M1104267</guid>
      <dc:creator>dwillia5@highpoint.edu</dc:creator>
      <dc:date>2023-09-15T10:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: remote access vpn traffic</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-traffic/m-p/4924030#M1104269</link>
      <description>&lt;P&gt;You need to configure the RAVPN to be tunnel-all and not split-tunnel.&amp;nbsp; In addition to this you will need a NAT statement that will translate RAVPN users to the outside interface IP (or another public IP).&amp;nbsp; so the nat statement would have source interface outside, destination interface outside. Also, depending on if you have set up RAVPN to bypass the interface ACL or not, you might need to allow access from the RAVPN subnet to any / internet.&lt;/P&gt;
&lt;P&gt;You can refer to the following link for more information on setting up RAVPN.&amp;nbsp; But as you have this already set up you might just want to focus on the "hair-pinning" part.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215875-configure-anyconnect-vpn-client-on-ftd.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215875-configure-anyconnect-vpn-client-on-ftd.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 10:19:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-traffic/m-p/4924030#M1104269</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-09-15T10:19:52Z</dc:date>
    </item>
  </channel>
</rss>

