<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Please clarify if you want to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-internet-access-while-anyconnect/m-p/2845662#M160121</link>
    <description>&lt;P&gt;Please clarify if you want to let the users use the internet from their VPN&amp;nbsp;access or the internet on their Local Site:&lt;/P&gt;
&lt;P&gt;If you want to route all of their traffic through the VPN tunnel (Not my personal preference) you should try NAT and If you want the local Internet be used for them you should try Split tunneling and Split DNS features&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 01 Feb 2016 20:29:56 GMT</pubDate>
    <dc:creator>shahab.66</dc:creator>
    <dc:date>2016-02-01T20:29:56Z</dc:date>
    <item>
      <title>ALLOW INTERNET ACCESS WHILE ANYCONNECT</title>
      <link>https://community.cisco.com/t5/network-security/allow-internet-access-while-anyconnect/m-p/2845661#M160111</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I dont know how to allow internet access while cisco anyconnect clients are connected. I´m new with VPN connections and I´m totally lost here.&lt;/P&gt;
&lt;P&gt;Please could anybody help with this? Many, many thanks in advance.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;: Serial Number: JAD19220344&lt;BR /&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.4(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password WmlxhdtfAnw9XbcA encrypted&lt;BR /&gt;passwd ta.qizy4R//ChqQH encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool Pool_139 139.16.1.50-139.16.1.80 mask 255.255.255.0&lt;BR /&gt;ip local pool Pool_172 172.16.1.100-172.16.1.130 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.1.100 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 139.16.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 172.16.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt; management-only&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 11.11.11.11 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup DMZ&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 172.16.1.69&lt;BR /&gt; name-server 8.8.8.8&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network inside-subnet&lt;BR /&gt; subnet 139.16.1.0 255.255.255.0&lt;BR /&gt;object network dmz-subnet&lt;BR /&gt; subnet 172.16.1.0 255.255.255.0&lt;BR /&gt;object network wialon-server-external-ip&lt;BR /&gt; host 192.168.1.132&lt;BR /&gt;object network wialon-server&lt;BR /&gt; host 172.16.1.69&lt;BR /&gt;object service Wialon-services-TCP&lt;BR /&gt; service tcp source range 1 65535 destination range 20100 21999&lt;BR /&gt;object service Wialon-services-UDP&lt;BR /&gt; service udp source range 20100 21999 destination range 20100 21999&lt;BR /&gt;object network NETWORK_OBJ_139.16.1.0_25&lt;BR /&gt; subnet 139.16.1.0 255.255.255.128&lt;BR /&gt;object network wialon-server-ssl&lt;BR /&gt; host 172.16.1.69&lt;BR /&gt;object service wialon-ssl&lt;BR /&gt; service tcp source range 1 65535 destination eq 555&lt;BR /&gt;object network wialon-server-20981&lt;BR /&gt; host 172.16.1.69&lt;BR /&gt;object network wialon-server-20981UDP&lt;BR /&gt; host 172.16.1.69&lt;BR /&gt;object service walon-ssl2&lt;BR /&gt; service tcp source range 1 65535 destination eq 556&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object tcp destination eq www&lt;BR /&gt; service-object udp destination eq domain&lt;BR /&gt; service-object tcp destination eq https&lt;BR /&gt;access-list outside_acl extended permit tcp any object wialon-server eq www&lt;BR /&gt;access-list outside_acl extended permit object Wialon-services-TCP any object wialon-server&lt;BR /&gt;access-list outside_acl extended permit object Wialon-services-UDP any object wialon-server&lt;BR /&gt;access-list outside_acl extended permit object wialon-ssl any object wialon-server&lt;BR /&gt;access-list outside_acl extended permit object walon-ssl2 any object wialon-server&lt;BR /&gt;access-list DMZ_access_in extended permit ip object wialon-server 139.16.1.0 255.255.255.0&lt;BR /&gt;access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_1 any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (DMZ,outside) source static any any destination static NETWORK_OBJ_139.16.1.0_25 NETWORK_OBJ_139.16.1.0_25 route-lookup&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_139.16.1.0_25 NETWORK_OBJ_139.16.1.0_25 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;object network inside-subnet&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network wialon-server&lt;BR /&gt; nat (DMZ,outside) static wialon-server-external-ip&lt;BR /&gt;access-group outside_acl in interface outside&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 11.11.11.0 255.255.255.0 management&lt;BR /&gt;http 139.16.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt; protocol esp encryption aes-192&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt; protocol esp encryption aes&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt; protocol esp encryption des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt; enrollment self&lt;BR /&gt; fqdn ciscoasa.srdongato.null&lt;BR /&gt; email lunero@gmail.com&lt;BR /&gt; subject-name CN=srdongato&lt;BR /&gt; serial-number&lt;BR /&gt; proxy-ldc-issuer&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt; enrollment self&lt;BR /&gt; fqdn none&lt;BR /&gt; subject-name CN=139.16.1.1,CN=ciscoasa&lt;BR /&gt; keypair ASDM_LAUNCHER&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;BR /&gt; certificate 09836256&lt;BR /&gt; 30820381 30820269 a0030201 02020409 83625630 0d06092a 864886f7 0d010105&lt;BR /&gt; 05003050 31123010 06035504 03130973 72646f6e 6761746f 313a3012 06035504&lt;BR /&gt; 05130b4a 41443139 32323033 34343024 06092a86 4886f70d 01090216 17636973&lt;BR /&gt; 636f6173 612e7372 646f6e67 61746f2e 6e756c6c 301e170d 31353132 30353036&lt;BR /&gt; 33333535 5a170d32 35313230 32303633 3335355a 30503112 30100603 55040313&lt;BR /&gt; 09737264 6f6e6761 746f313a 30120603 55040513 0b4a4144 31393232 30333434&lt;BR /&gt; 30240609 2a864886 f70d0109 02161763 6973636f 6173612e 7372646f 6e676174&lt;BR /&gt; 6f2e6e75 6c6c3082 0122300d 06092a86 4886f70d 01010105 00038201 0f003082&lt;BR /&gt; 010a0282 010100d2 295e679c 153e8b6a d3f6131d 8ea646e3 aa0a5fa9 20e49259&lt;BR /&gt; ca895563 7e818047 033a4e8f 57f619e9 fa93bfd5 6c44141f b0abf2c0 8b86334e&lt;BR /&gt; bac63f41 99e6d676 c689dcf7 080f2715 038a8e1b 694a00de 7124565e a1948f09&lt;BR /&gt; 8dbeffab c7c8a028 741c5b10 d0ede5e9 599f38fe 5b88f678 4decdc4b 353b6708&lt;BR /&gt; cfa2fbce f58be06e 18feba56 4b2b04a1 77773ec6 5c58d2ed d7ca4f17 980f0353&lt;BR /&gt; 138bfe65 1b1165e6 7b6f94bb ab4d4286 e900178c 147a6dba 2427f38e e225030f&lt;BR /&gt; 0a66d1eb 5075c57e 6d77e5bb 247f5bc3 8d3530f0 49dedf2d 21a24b5f daa08d98&lt;BR /&gt; 690183cf e82a6b8d 5e489956 c5eecdbc 7fc2365c b629a52b 126b51e2 18590ed5&lt;BR /&gt; c9da8503 a639f102 03010001 a3633061 300f0603 551d1301 01ff0405 30030101&lt;BR /&gt; ff300e06 03551d0f 0101ff04 04030201 86301f06 03551d23 04183016 80143468&lt;BR /&gt; dec79103 0a91b530 1ada7e47 7e27b16d 4186301d 0603551d 0e041604 143468de&lt;BR /&gt; c791030a 91b5301a da7e477e 27b16d41 86300d06 092a8648 86f70d01 01050500&lt;BR /&gt; 03820101 003cdb04 8ef5ed31 c05c684b ad2b0062 96bfd39a ecb0a3fe 547aebe5&lt;BR /&gt; 14b753e7 89f55827 3d4e0aa8 b8674e45 80d4c023 8e99a7b4 0907d347 060a2fe4&lt;BR /&gt; fa6e0c2f 3b9cd708 a539c09f 7022d2ee fb6e2cf6 82b0e861 a2839a71 1512b3ec&lt;BR /&gt; e28664e9 732270c9 d1c679d9 1eaf2ad5 007b5699 31c3ff97 09aae869 88677a3d&lt;BR /&gt; ecb3032e 2dd0f74f 81f9a8fb 79f30809 723bbdbf dfef4154 5ad6b012 a8f37093&lt;BR /&gt; 481fa678 23390036 b44b0290 042828f3 5eefdc43 78934455 ebe52d26 9b4234a9&lt;BR /&gt; bfeebc43 731c4146 166e5adc b431f12f 8d0fbf16 46306228 34d76984 d2e6ebbc&lt;BR /&gt; 96838694 88ca120a d4f32884 963e7385 987ec6b0 dfa28d49 05ba5fa8 641bcfc7&lt;BR /&gt; ff92ac3c 52&lt;BR /&gt; quit&lt;BR /&gt;crypto ca certificate chain ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt; certificate 0a836256&lt;BR /&gt; 308202cc 308201b4 a0030201 0202040a 83625630 0d06092a 864886f7 0d010105&lt;BR /&gt; 05003028 3111300f 06035504 03130863 6973636f 61736131 13301106 03550403&lt;BR /&gt; 130a3133 392e3136 2e312e31 301e170d 31353132 30353036 35363236 5a170d32&lt;BR /&gt; 35313230 32303635 3632365a 30283111 300f0603 55040313 08636973 636f6173&lt;BR /&gt; 61311330 11060355 0403130a 3133392e 31362e31 2e313082 0122300d 06092a86&lt;BR /&gt; 4886f70d 01010105 00038201 0f003082 010a0282 010100e7 a5c16e86 16c15a10&lt;BR /&gt; e018b868 bac7271a 30f1a3f8 ecb9c6b8 3ed4b1ad c9468f5e 287f2a7a 644f1496&lt;BR /&gt; c43a061e da927d09 a755b53e ed7c6a66 f2f1fb1e f944345c 86e08ce0 891c99b3&lt;BR /&gt; 13101ab3 04963fad f91f987f 99f22a89 cd1e8c5a 5e4c026d 2cadd7b7 6620bbd1&lt;BR /&gt; b4a5135b 24ec886f fa061a06 dd536e96 1e483730 756c4101 23f83a8d 944a7fbe&lt;BR /&gt; 93c51d56 32ac0d17 ceb75f63 0ae24f07 f2c54e83 5b84ff00 16b0b899 c925c737&lt;BR /&gt; 1765b066 23b54645 bc419684 d09dd130 c1479949 68b0a779 df39b078 6fb0deb9&lt;BR /&gt; 758b14c3 f0801faf f0ad60e1 a018ffba d769f867 3fe8e5fc 88ccc5b2 2319f5d4&lt;BR /&gt; 617a78c4 74e7a64b 5c68276c 06ea57c1 d0ffce4b 358c4d02 03010001 300d0609&lt;BR /&gt; 2a864886 f70d0101 05050003 82010100 dff97c9f 4256fd47 8eb661fd d22ecea4&lt;BR /&gt; 589eff09 958e01f1 a435a20e 5ed1cf19 af42e54d d61fc0ab cb2ee7ac 7fcb4513&lt;BR /&gt; 1a44cc86 1e020d72 3a3f78d2 4d225177 857093d9 f5fcf3c7 6e656d2b 54a0c522&lt;BR /&gt; f636b8cf 33c5ae34 ea340f32 85dff4c1 50165e7a e94de10b ced15752 0b3a76c1&lt;BR /&gt; 20291106 2a50777b a1a8a214 8a003716 680c15d4 ac3f7cc7 378f8f5f 38e3403f&lt;BR /&gt; f958c095 e549c8ed 4baf8cc5 bdcd230e 260754ea 953c3a4c eb01fef5 62b97e01&lt;BR /&gt; 9f82ce6b f479dbdd 000c45af 8758b35f b4a958ee 32c4db3f 2ddc7385 dc05b0e3&lt;BR /&gt; 78b609ba a9280841 2433ae87 5dd7a7c2 d5691068 1dc0eddc c23f99c5 3df8b1a5&lt;BR /&gt; aadbd82a 423f4ba8 563142bf 742771c3&lt;BR /&gt; quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt; encryption aes-256&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt; encryption aes-192&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt; encryption aes&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt; encryption 3des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt; encryption des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint0&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt;telnet 139.16.1.0 255.255.255.0 inside&lt;BR /&gt;telnet 11.11.11.0 255.255.255.0 management&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.16.1.69-172.16.1.69 DMZ&lt;BR /&gt;dhcpd dns 87.216.1.65 87.216.1.66 interface DMZ&lt;BR /&gt;dhcpd option 3 ip 172.16.1.1 interface DMZ&lt;BR /&gt;dhcpd enable DMZ&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_0 outside&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_0 inside&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_0 DMZ&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_0 inside vpnlb-ip&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; enable inside&lt;BR /&gt; enable DMZ&lt;BR /&gt; anyconnect image disk0:/anyconnect-win-4.2.01022-k9.pkg 1&lt;BR /&gt; anyconnect image disk0:/anyconnect-win-3.1.12020-k9.pkg 2&lt;BR /&gt; anyconnect profiles Wialon_client_profile disk0:/Wialon_client_profile.xml&lt;BR /&gt; anyconnect profiles dongato_client_profile disk0:/dongato_client_profile.xml&lt;BR /&gt; anyconnect enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt; error-recovery disable&lt;BR /&gt;group-policy GroupPolicy_dongato internal&lt;BR /&gt;group-policy GroupPolicy_dongato attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 172.16.1.69 8.8.8.8&lt;BR /&gt; vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt; default-domain none&lt;BR /&gt; webvpn&lt;BR /&gt; anyconnect profiles value dongato_client_profile type user&lt;BR /&gt;group-policy GroupPolicy_Wialon internal&lt;BR /&gt;group-policy GroupPolicy_Wialon attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 192.168.1.1&lt;BR /&gt; vpn-tunnel-protocol ikev2 ssl-client ssl-clientless&lt;BR /&gt; default-domain none&lt;BR /&gt; webvpn&lt;BR /&gt; anyconnect profiles value Wialon_client_profile type user&lt;BR /&gt;group-policy VPN internal&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username dongato1 password c7qapEnn4RfoDLr4 encrypted&lt;BR /&gt;username wialon_1 password Wy2aFpAQTXQavfJD encrypted&lt;BR /&gt;username wialon_2 password 4STJ9bvyWxOTxIyH encrypted&lt;BR /&gt;tunnel-group Wialon type remote-access&lt;BR /&gt;tunnel-group Wialon general-attributes&lt;BR /&gt; address-pool Pool_139&lt;BR /&gt; default-group-policy GroupPolicy_Wialon&lt;BR /&gt;tunnel-group Wialon webvpn-attributes&lt;BR /&gt; group-alias Wialon enable&lt;BR /&gt;tunnel-group dongato type remote-access&lt;BR /&gt;tunnel-group dongato general-attributes&lt;BR /&gt; address-pool Pool_139&lt;BR /&gt; default-group-policy GroupPolicy_dongato&lt;BR /&gt;tunnel-group dongato webvpn-attributes&lt;BR /&gt; group-alias dongato enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:d735f2c6defeba3ab9d217a6c1d55b90&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:13:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-internet-access-while-anyconnect/m-p/2845661#M160111</guid>
      <dc:creator>ciscolunero</dc:creator>
      <dc:date>2019-03-12T07:13:28Z</dc:date>
    </item>
    <item>
      <title>Please clarify if you want to</title>
      <link>https://community.cisco.com/t5/network-security/allow-internet-access-while-anyconnect/m-p/2845662#M160121</link>
      <description>&lt;P&gt;Please clarify if you want to let the users use the internet from their VPN&amp;nbsp;access or the internet on their Local Site:&lt;/P&gt;
&lt;P&gt;If you want to route all of their traffic through the VPN tunnel (Not my personal preference) you should try NAT and If you want the local Internet be used for them you should try Split tunneling and Split DNS features&lt;/P&gt;
&lt;P&gt;Regards,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Feb 2016 20:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-internet-access-while-anyconnect/m-p/2845662#M160121</guid>
      <dc:creator>shahab.66</dc:creator>
      <dc:date>2016-02-01T20:29:56Z</dc:date>
    </item>
    <item>
      <title>Thanks, I want to use local</title>
      <link>https://community.cisco.com/t5/network-security/allow-internet-access-while-anyconnect/m-p/2845663#M160129</link>
      <description>&lt;P&gt;Thanks, I want to use local internet for them so I´m trying with split tunneling.&lt;/P&gt;
&lt;P&gt;Kind regards.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Feb 2016 20:53:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-internet-access-while-anyconnect/m-p/2845663#M160129</guid>
      <dc:creator>ciscolunero</dc:creator>
      <dc:date>2016-02-01T20:53:42Z</dc:date>
    </item>
  </channel>
</rss>

