<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Split Tunnel VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356936#M306123</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i use Remote VPN to connect how can i know which tunnel group i will be hitting?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 Jan 2014 21:30:44 GMT</pubDate>
    <dc:creator>mahesh18</dc:creator>
    <dc:date>2014-01-08T21:30:44Z</dc:date>
    <item>
      <title>Split Tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356931#M306088</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When we use Remote VPN to connect to Company Network and tunnel is build up and we can access the company resources.&lt;/P&gt;&lt;P&gt;When we need to access the internet it checks the ACL&amp;nbsp; in&amp;nbsp; the ASA&amp;nbsp; and point it to outside world.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to confirm this technology is called Split VPN?&lt;/P&gt;&lt;P&gt;What&amp;nbsp;&amp;nbsp; command i can run on ASA to check if split tunnel is used?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or should o look for ACL?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:26:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356931#M306088</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T03:26:43Z</dc:date>
    </item>
    <item>
      <title>Split Tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356932#M306094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No need to check ACL for the outside interface (unless direction out)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Split Tunnel will let you configure which traffic will be sent over the VPN tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you want to send all traffic via the tunnel leave it default. If is not the case configure an ACL and include only the IP destination address that traffic will be sent via the Tunnel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for some Networking Assistance?&amp;nbsp; &lt;BR /&gt;&lt;SPAN&gt;Contact me directly at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Jan 2014 18:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356932#M306094</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-01-08T18:48:40Z</dc:date>
    </item>
    <item>
      <title>Split Tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356933#M306102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To determine whether you are using Split Tunnel or Full Tunnel VPN and you want to determine that through the ASA configurations you should first list the &lt;STRONG&gt;"tunnel-group"&lt;/STRONG&gt; configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run tunnel-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will list all the different type of VPN configurations on your ASA (Even the L2L VPN between sites)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next you should find the &lt;STRONG&gt;"tunnel-group"&lt;/STRONG&gt; that you are using for the VPN Client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you find the &lt;STRONG&gt;"tunnel-group"&lt;/STRONG&gt; that you are using then you should check if it has a the following value under it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tunnel-group &lt;TUNNEL group="" name=""&gt; general-attributes&lt;/TUNNEL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; default-group-policy &lt;GROUP policy="" name=""&gt;&lt;/GROUP&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it has the &lt;STRONG&gt;"default-group-policy"&lt;/STRONG&gt; set then you have to check the that &lt;STRONG&gt;"group-policy"&lt;/STRONG&gt; configuration with command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run group-policy &lt;GROUP policy="" name=""&gt;&lt;/GROUP&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will possibly list following values&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;split-tunnel-policy tunneall&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;split-tunnel-policy tunnelspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;split-tunnel-network-list &lt;ACL name=""&gt;&lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally of the above the first clearly shows that Full Tunnel VPN would be used an all traffic would be sent through the VPN. I also think that if the &lt;STRONG&gt;"group-policy"&lt;/STRONG&gt; doesnt make any mention of the above configurations it will also mean that you are using Full Tunnel VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second output would tell you that you are tunneling only specific networks that are defined in the ACL used in the second command. This would naturally be called Split Tunnel VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also take note that if using LOCAL authentication on the ASA for the VPN user then the &lt;STRONG&gt;"group-policy"&lt;/STRONG&gt; could be attached even to the &lt;STRONG&gt;"username"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could check if its so with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run username &lt;USERNAME&gt;&lt;/USERNAME&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could naturally also tell which type of VPN you are using simply connecting the VPN connection and finding the Routes/Secured Routes section and look at the Secured Routes output.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If it only mentions 0.0.0.0 then its Full Tunnel&lt;/LI&gt;&lt;LI&gt;If it mentions specific networks its Split Tunnel&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are saying that when you are trying to access the Internet from the VPN Client you can see an ACL being checked on the ASA and traffic sent to the external/public network? If this is true it would seem that you are using Full Tunnel VPN if even Internet traffic is coming through the VPN Connection first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You seeing an ACL check would also mean that you have configured the ASA in a way that even incoming connections through a VPN are being checked against ACL. This might be an interface ACL on the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; or perhaps a VPN Filter configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Jan 2014 20:00:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356933#M306102</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-08T20:00:50Z</dc:date>
    </item>
    <item>
      <title>Split Tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356934#M306109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Going step by step&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run tunnel-group shows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group TunnelGroupX type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group GrpX type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group GrpX general-attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group GrpCorp001 type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group GrpCorp001 general-attributes&lt;/P&gt;&lt;P&gt;default-group-policy CorpGroupPolicy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group GrpCorp001 ipsec-attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems it has 2 tunnel groups which are defined right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also it has single default policy so this policy is used by all the VPN clients right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I checked &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run group-policy &lt;GROUP policy="" name=""&gt;&lt;/GROUP&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does not show split tunnel anywhere so seems all Internet traffic is going via&amp;nbsp; Corp Network right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Jan 2014 21:08:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356934#M306109</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-01-08T21:08:17Z</dc:date>
    </item>
    <item>
      <title>Split Tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356935#M306116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems there is 3 &lt;STRONG&gt;"tunnel-group"&lt;/STRONG&gt; above for &lt;STRONG&gt;"remote-access"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 of them seem to have no &lt;STRONG&gt;"group-policy"&lt;/STRONG&gt; so they use the default one on the ASA that unchanged means Full Tunnel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 of the &lt;STRONG&gt;"tunnel-group"&lt;/STRONG&gt; has a &lt;STRONG&gt;"group-policy"&lt;/STRONG&gt; and it doesnt seem to list any Split Tunnel configurations I mentioned above so it would mean its Full Tunnel too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would seem all 3 &lt;STRONG&gt;"tunnel-group"&lt;/STRONG&gt; are therefore using Full Tunnel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Jan 2014 21:18:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356935#M306116</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-08T21:18:18Z</dc:date>
    </item>
    <item>
      <title>Split Tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356936#M306123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i use Remote VPN to connect how can i know which tunnel group i will be hitting?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Jan 2014 21:30:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356936#M306123</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-01-08T21:30:44Z</dc:date>
    </item>
    <item>
      <title>Split Tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356937#M306124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It depends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using AnyConnect SSL VPN Client then you would typically see the &lt;STRONG&gt;"tunnel-group"&lt;/STRONG&gt; name if in the AnyConnect VPN Clients drop down menu when you are connecting to the ASA. Though I guess the name might even be an alias for the &lt;STRONG&gt;"tunnel-group"&lt;/STRONG&gt; name also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using the Cisco VPN Client (IPsec Client) then the &lt;STRONG&gt;"tunnel-group"&lt;/STRONG&gt; is configured under the Connection Entry&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the Main Window&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/9/9/1/174199-CSC-VPN-MAIN.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Choose the &lt;STRONG&gt;Connection Entry &lt;/STRONG&gt;that you are using and click the &lt;STRONG&gt;Modify&lt;/STRONG&gt; -button above&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/1/2/174218-CSC-VPN-MODIFY.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see from the above, the &lt;STRONG&gt;"Name"&lt;/STRONG&gt; field contains the name of the &lt;STRONG&gt;"tunnel-group"&lt;/STRONG&gt; used. The value inserted to the &lt;STRONG&gt;"Password"&lt;/STRONG&gt; fields would be the &lt;STRONG&gt;Pre Shared Key&lt;/STRONG&gt; that you have configured in the &lt;STRONG&gt;"tunnel-group" &lt;/STRONG&gt;on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Jan 2014 21:41:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356937#M306124</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-08T21:41:50Z</dc:date>
    </item>
    <item>
      <title>Split Tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356938#M306127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes i saw the name when i click on modify.&lt;/P&gt;&lt;P&gt;Seems its lot of info for today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Jan 2014 21:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2356938#M306127</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-01-08T21:53:55Z</dc:date>
    </item>
  </channel>
</rss>

