<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Anyconnect Exclude List not working. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057464#M438974</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;group-policy Vandyke internal&lt;/P&gt;&lt;P&gt;group-policy Vandyke attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.25 4.2.2.2&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ssl-client&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value VANDYKE_EXCLUDES&lt;/P&gt;&lt;P&gt; default-domain value securesub.net&lt;/P&gt;&lt;P&gt; split-dns value 192.168.0.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa(config)# sh run | i VANDYKE&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES remark SECURESUB_WIFI&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES standard permit 192.168.101.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES remark SECURESUB_LAN&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES remark BOOZE-PKI LAB&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES standard deny 10.100.60.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES remark INTERNET TRAFFIC&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES standard permit any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 24 Aug 2012 18:23:26 GMT</pubDate>
    <dc:creator>danbryan80</dc:creator>
    <dc:date>2012-08-24T18:23:26Z</dc:date>
    <item>
      <title>Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057456#M438957</link>
      <description>&lt;P&gt;I am using Anyconnect and I have a group policy configured with a split tunnel policy to "Exclude Network Lists Below".&amp;nbsp; I created a list to define my local LAN which I don't want to be "secured by the vpn".&amp;nbsp; Whenever I VPN in, it still forces all traffic to be secured.&amp;nbsp; On the contrary, if I set the tunnel policy to "Include networks below" and define a network that I want to force through the tunnel, that setting does get carried though to the any connect client.&amp;nbsp; What could cause a Exclude list to not show up, but an include list does?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057456#M438957</guid>
      <dc:creator>danbryan80</dc:creator>
      <dc:date>2019-03-11T23:45:57Z</dc:date>
    </item>
    <item>
      <title>Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057457#M438960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Daniel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you are confused with the use of the VPN Split-tunnel&lt;/P&gt;&lt;P&gt;What you are going to place in the Split-tunnel is witch traffic (Destination) will be encrypted so for example if you just want to encrypt the data going to the other side of the tunnel or all traffic (Default)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope I understood the question&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 03:35:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057457#M438960</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-24T03:35:55Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057458#M438963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, I am on the 100.100.60.0/24 network and I VPN into my development network. 192.168.0.0/24.&amp;nbsp; I only want to encrypt traffic going to the 192.168.0.0/24 network, I want to EXCLUDE traffic going from the 10.100.60.0/24 network.&amp;nbsp; Whenever i configure my group policy to exclude traffic going to PKILAB, and define PKILAB as 100.100.60.0/24 it still tries to send traffic desitned for the PKILAB over the VPN, when it should be excluding it.&amp;nbsp; But I know the group policy settings are getting applied because other items such as the DNS get sent to anyconnect client settings.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 04:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057458#M438963</guid>
      <dc:creator>danbryan80</dc:creator>
      <dc:date>2012-08-24T04:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057459#M438966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Daniel,&lt;/P&gt;&lt;P&gt;Just to make sure we are on the same page&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.0.0/24---ASA---INTERNET-------Anyconnect client at 100.100.60.0.24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that correct? if yes and you only want to encrypt the traffic going to the 192. from your client here is what you need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy whatever attributes&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Turn down the tunnel and give it a try &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 05:27:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057459#M438966</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-24T05:27:16Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057460#M438968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Client IP: 10.100.60.47/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Local lab segments:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.100.60.0/24&lt;/P&gt;&lt;P&gt;192.168.50.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa.securesub.net:8080 Anyconnect Gateway to my remote Lab&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I am connected to my remote lab I am given A client IP address of 192.168.0.193/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My remote lab has 2 different subnets:&lt;/P&gt;&lt;P&gt;192.168.0.0/24 &lt;/P&gt;&lt;P&gt;192.168.101.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I connect to the ASA, I am haveing "0.0.0.0 secured"&amp;nbsp; This prevents me from being able to access the to Local subnets.&amp;nbsp; I should be able to say "Split tunnel, and Exclude 10.100.60./ and 192.168.50.0 from being sent through the tunnel".&amp;nbsp; See picture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://i.imgur.com/ZJoS1.png" rel="nofollow"&gt;http://i.imgur.com/ZJoS1.png&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 12:48:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057460#M438968</guid>
      <dc:creator>danbryan80</dc:creator>
      <dc:date>2012-08-24T12:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057461#M438970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Daniel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The image does not work!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why don't you try with my configuration, please&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list test standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif; min-height: 8pt; height: 8pt;"&gt; access-list test standard permit 192.168.101.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;group-policy whatever attributes&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;split-tunnel-network-list value test&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 16:29:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057461#M438970</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-24T16:29:23Z</dc:date>
    </item>
    <item>
      <title>Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057462#M438971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When I use the config you mentioned where i only define which traffic i want to secure it allows me to access my secured resources and my local resources, but it doesn't tunnel my UNKNOWN(internet browsing) through the tunnel which is one of my goals.&amp;nbsp; Thats why i was trying to go the exclude route.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried to add 0.0.0.0/24 to the permited list of traffic to be secured, but that doesnt seem to work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 17:52:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057462#M438971</guid>
      <dc:creator>danbryan80</dc:creator>
      <dc:date>2012-08-24T17:52:16Z</dc:date>
    </item>
    <item>
      <title>Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057463#M438972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Daniel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay I now understand what you mean....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why don't you try with my configuration, please&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list 2test standard permit &lt;SPAN style="background-color: #ffffff;"&gt;10.100.60.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="background-color: #f7fafb;"&gt;access-list 2test standard permit &lt;/SPAN&gt;192.168.50.0 &lt;SPAN style="background-color: #f7fafb;"&gt;255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;group-policy whatever attributes&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;split-tunnel-policy excludespecified &lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;split-tunnel-network-list value 2test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Turn the tunnel down and re-connect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;If this by any chance does not work please paste your group policy and tunnel group setup ( you can change the outside Ip addresses of coure) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Remember to rate the helpful posts &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG&gt;Julio&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="background-color: #f7fafb;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 17:58:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057463#M438972</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-24T17:58:55Z</dc:date>
    </item>
    <item>
      <title>Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057464#M438974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;group-policy Vandyke internal&lt;/P&gt;&lt;P&gt;group-policy Vandyke attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.25 4.2.2.2&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ssl-client&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value VANDYKE_EXCLUDES&lt;/P&gt;&lt;P&gt; default-domain value securesub.net&lt;/P&gt;&lt;P&gt; split-dns value 192.168.0.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa(config)# sh run | i VANDYKE&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES remark SECURESUB_WIFI&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES standard permit 192.168.101.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES remark SECURESUB_LAN&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES remark BOOZE-PKI LAB&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES standard deny 10.100.60.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES remark INTERNET TRAFFIC&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES standard permit any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 18:23:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057464#M438974</guid>
      <dc:creator>danbryan80</dc:creator>
      <dc:date>2012-08-24T18:23:26Z</dc:date>
    </item>
    <item>
      <title>Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057465#M438976</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Daniel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now the configuration is not the one I sent you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this : &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you changed the setup to this:&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list 2test standard permit 10.100.60.0 255.255.255.0&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list 2test standard permit 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;group-policy whatever attributes&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;split-tunnel-policy excludespecified&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;split-tunnel-network-list value 2test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 18:28:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057465#M438976</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-24T18:28:38Z</dc:date>
    </item>
    <item>
      <title>Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057466#M438978</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think were mis communicating.&amp;nbsp; I made the changes you asked me to try(see below) and now I can no longer access Booze-pki lab, or Vandyke_wifi resources.&amp;nbsp; Also I am now unable to access any of my VPN resources from securesub.&amp;nbsp; In addition, my internet traffic is not being sent through the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa(config)# sh run | i split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;asa(config)# sh run | i VANDYKE&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES remark BOOZE-PKI LAB&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES standard permit 10.100.60.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES remark VANDYKE_WIFI&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES standard permit 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value VANDYKE_EXCLUDES&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A quick summary of my setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am on a LAN segment 10.100.60.0/24 and need to be able to access recources on the segment as well as the 192.168.50.0 segment.&amp;nbsp; I can do this without using a VPN.&amp;nbsp; I also want to be able to access my VPN resources(securesub Lan and securesub WIFI).&amp;nbsp; I Also want all Internet traffic while connected to the VPN to get routed through securesub.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I should be Securing "Securesub_LAN, Securesub_WIFI, and Internet) and not securing 10.100.60.0 or 192.168.50.0 if i understand correctly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 18:42:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057466#M438978</guid>
      <dc:creator>danbryan80</dc:creator>
      <dc:date>2012-08-24T18:42:59Z</dc:date>
    </item>
    <item>
      <title>Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057467#M438979</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Daniel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interesting, never had this issue before,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay time to use the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0.4em 0px 0.5em; line-height: 19.045454025268555px; color: #000000; font-family: sans-serif; font-size: 12.727272033691406px; background-color: #ffffff;"&gt;access-list Local_LAN_Access standard permit host 0.0.0.0&lt;/P&gt;&lt;P style="margin: 0.4em 0px 0.5em; line-height: 19.045454025268555px; color: #000000; font-family: sans-serif; font-size: 12.727272033691406px; background-color: #ffffff;"&gt;access-list Local_LAN_Access remark VPN-Local-LAN-Access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy Vandyke attributes&lt;/P&gt;&lt;P style="margin: 0.4em 0px 0.5em; line-height: 19.045454025268555px; color: #000000; font-family: sans-serif; font-size: 12.727272033691406px; background-color: #ffffff;"&gt;split-tunnel-policy excludespecified&lt;/P&gt;&lt;P style="margin: 0.4em 0px 0.5em; line-height: 19.045454025268555px; color: #000000; font-family: sans-serif; font-size: 12.727272033691406px; background-color: #ffffff;"&gt;split-tunnel-network-list value Local_LAN_Access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now starting from AnyConnect 2.3 version, Local LAN Access is disabled by default so you need to enable it from the Anyconnect client&amp;nbsp; preference settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all the helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 18:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057467#M438979</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-24T18:57:07Z</dc:date>
    </item>
    <item>
      <title>Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057468#M438980</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES remark Securesub_LAN&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES remark Securesub_WIFI&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES standard permit 192.168.101.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES remark INTERNET&lt;/P&gt;&lt;P&gt;access-list VANDYKE_EXCLUDES standard permit host 0.0.0.0&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value VANDYKE_EXCLUDES&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IMy internet traffic is not being tunneled. The rest works well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 20:15:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057468#M438980</guid>
      <dc:creator>danbryan80</dc:creator>
      <dc:date>2012-08-24T20:15:41Z</dc:date>
    </item>
    <item>
      <title>Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057469#M438981</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Daniel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you did not follow my instructions, it&amp;nbsp; is just &lt;/P&gt;&lt;P style="margin: 0.4em 0px 0.5em; background-color: #ffffff; border-collapse: collapse; font-size: 12.727272033691406px; list-style: none; line-height: 19.045454025268555px; color: #000000; font-family: sans-serif;"&gt;access-list Local_LAN_Access standard permit host 0.0.0.0&lt;/P&gt;&lt;P style="margin: 0.4em 0px 0.5em; background-color: #ffffff; border-collapse: collapse; font-size: 12.727272033691406px; list-style: none; line-height: 19.045454025268555px; color: #000000; font-family: sans-serif;"&gt;access-list Local_LAN_Access remark VPN-Local-LAN-Access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to take the rest out from the ACL &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2012 20:41:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057469#M438981</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-24T20:41:13Z</dc:date>
    </item>
    <item>
      <title>Anyconnect Exclude List not working.</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057470#M438982</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Sep 2012 19:15:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-exclude-list-not-working/m-p/2057470#M438982</guid>
      <dc:creator>danbryan80</dc:creator>
      <dc:date>2012-09-06T19:15:30Z</dc:date>
    </item>
  </channel>
</rss>

