<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Split tunnel VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401042#M308535</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In that case I would just remove the "sysopt connection permit VPN" from the ASA and configure ACL on the interface where the tunnel terminates to filter out the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That would be my suggestion&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 20 Nov 2013 22:06:00 GMT</pubDate>
    <dc:creator>jumora</dc:creator>
    <dc:date>2013-11-20T22:06:00Z</dc:date>
    <item>
      <title>Split tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401039#M308520</link>
      <description>&lt;P&gt;This is a 2 part question...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How many split tunnel VPN's can a ASA5510 handle?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the necessary commands/steps to setting one up?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not done this in a while and I want to make I don't mess it up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:07:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401039#M308520</guid>
      <dc:creator>Liam Dwyer</dc:creator>
      <dc:date>2019-03-12T03:07:38Z</dc:date>
    </item>
    <item>
      <title>Split tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401040#M308526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Configuration on the ASA is based on memory not amount but the limit of ACE within a split tunnel are the next:&lt;/P&gt;&lt;H3&gt; &lt;A name="aceentries"&gt;Limitation with Number of Entries in a Split Tunnel ACL&lt;/A&gt; &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a restriction with the number of entries in an ACL used for &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; split tunnel. It is recommended not to use more than 50-60 ACE entries for &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; satisfactory functionality. You are advised to implement the subnetting feature &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to cover a range of IP addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;ASA/PIX: Allow Split Tunneling for VPN Clients on the ASA Configuration Example&lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080702999.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080702999.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;ASA 8.x : Allow Split Tunneling for AnyConnect VPN Client on the ASA Configuration Example&lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080975e83.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080975e83.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look at the next video:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://tools.cisco.com/squish/653799" id="ext-gen223"&gt;http://tools.cisco.com/squish/653799&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 21:52:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401040#M308526</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-20T21:52:05Z</dc:date>
    </item>
    <item>
      <title>Split tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401041#M308530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; apologies this is for a business to business split tunnel vpn.&lt;/P&gt;&lt;P&gt;should have said that to begin with...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 21:56:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401041#M308530</guid>
      <dc:creator>Liam Dwyer</dc:creator>
      <dc:date>2013-11-20T21:56:14Z</dc:date>
    </item>
    <item>
      <title>Split tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401042#M308535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In that case I would just remove the "sysopt connection permit VPN" from the ASA and configure ACL on the interface where the tunnel terminates to filter out the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That would be my suggestion&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 22:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401042#M308535</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-20T22:06:00Z</dc:date>
    </item>
    <item>
      <title>Split tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401043#M308536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Okay but this doesnt cover all the commands to configure or set up the peer to peer, correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Nov 2013 20:25:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401043#M308536</guid>
      <dc:creator>Liam Dwyer</dc:creator>
      <dc:date>2013-11-21T20:25:58Z</dc:date>
    </item>
    <item>
      <title>Split tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401044#M308537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you remove the sysopt connection permit VPN traffic that is related to VPN needs to be filtered through normal ACL and access-group on the interface where you configure the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to configure the ASA for LAN to LAN IPSec:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080950890.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080950890.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most Common L2L and Remote Access IPsec VPN Troubleshooting Solutions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807e0aca.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807e0aca.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Nov 2013 20:58:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401044#M308537</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-21T20:58:27Z</dc:date>
    </item>
    <item>
      <title>Split tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401045#M308538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Use a VPN-Filter then! Where you could even match Port-Information&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Nov 2013 06:28:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401045#M308538</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-11-22T06:28:38Z</dc:date>
    </item>
    <item>
      <title>Split tunnel VPN</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401046#M308539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure I follow exactly what you want to do.&amp;nbsp; Do you just want to set up split tunneling plain and simple, or do you want split VPN as well as restricting access to resources on your network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Setting up split tunneling is basically done by defining the interesting traffic which is to be encrypted on a L2L setup.&amp;nbsp; Here is a sample of how it would be set up on an ASA running version 8.3 or higher.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cryptoACL extended permit ip 10.10.10.0 255.255.255.0 11.11.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set SET esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto map MAP 5 match address cryptoACL&lt;/P&gt;&lt;P&gt;crypto map MAP 5 set peer &lt;PEER ip=""&gt;&lt;/PEER&gt;&lt;/P&gt;&lt;P&gt;crypto map MAP 5 set ikev1 transform-set SET&lt;/P&gt;&lt;P&gt;crypto map MAP interface outside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group &lt;PEER ip=""&gt; type ipsec-l2l&lt;/PEER&gt;&lt;/P&gt;&lt;P&gt;tunnel-group &lt;PEER ip=""&gt; ipsec-attributes&lt;/PEER&gt;&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key &lt;PASSWORD&gt;&lt;/PASSWORD&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network LOCAL_LAN&lt;/P&gt;&lt;P&gt;subnet 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network REMOTE_LAN&lt;/P&gt;&lt;P&gt;subnet 11.11.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LOCAL_LAN LOCAL_LAN destination static REMOTE_LAN REMOTE_LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to do VPN filtering then we would need to add some more commands to this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Nov 2013 07:39:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-vpn/m-p/2401046#M308539</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-11-22T07:39:25Z</dc:date>
    </item>
  </channel>
</rss>

