<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Split Tunnel question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/split-tunnel-question/m-p/1589936#M592989</link>
    <description>&lt;P&gt;Given the following statements which is a configuration line from one of my clients ASA boxes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list split-tunnel standard permit 192.168.14.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.3.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.4.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.5.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.6.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.10.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.11.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.20.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.25.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 198.100.100.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 172.16.1.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.50.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All of the networks that you see in the ACL above are inside networks.&amp;nbsp; The VPN client gets assigned an IP address of 10.10.1.X.&amp;nbsp; Do these statements simply allow the 10.10.1.x vpn network to talk to the listed networks in the ACL.&amp;nbsp; Does this mean that this is the only traffic allowed, and that traffic such as the Remote user connecting to the Internet is handled by the ISP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:42:38 GMT</pubDate>
    <dc:creator>Kevin Melton</dc:creator>
    <dc:date>2019-03-11T19:42:38Z</dc:date>
    <item>
      <title>Split Tunnel question</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-question/m-p/1589936#M592989</link>
      <description>&lt;P&gt;Given the following statements which is a configuration line from one of my clients ASA boxes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list split-tunnel standard permit 192.168.14.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.3.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.4.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.5.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.6.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.10.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.11.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.20.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.25.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 198.100.100.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 172.16.1.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.50.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All of the networks that you see in the ACL above are inside networks.&amp;nbsp; The VPN client gets assigned an IP address of 10.10.1.X.&amp;nbsp; Do these statements simply allow the 10.10.1.x vpn network to talk to the listed networks in the ACL.&amp;nbsp; Does this mean that this is the only traffic allowed, and that traffic such as the Remote user connecting to the Internet is handled by the ISP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:42:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-question/m-p/1589936#M592989</guid>
      <dc:creator>Kevin Melton</dc:creator>
      <dc:date>2019-03-11T19:42:38Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel question</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-question/m-p/1589937#M592990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you are absolutely correct.&lt;/P&gt;&lt;P&gt;Only networks in the split tunnel access-list will be encrypted and routed through the VPN tunnel from the remote client towards those specific networks. Traffic which are not specified in the access-list (eg: internet traffic) will be routed in clear text directly out through the remote client ISP/internet provider.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Jan 2011 16:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-question/m-p/1589937#M592990</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-31T16:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel question</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-question/m-p/1589938#M592991</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the prompt response Jennifer.&amp;nbsp; The next question would be, and this&lt;/P&gt;&lt;P&gt;is altogehter hypothetical, but if we wanted to force ALL traffic thru the VPN tunnel once the remote clien&lt;/P&gt;&lt;P&gt;t connected, what statement would I put on the ACL to effect this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Jan 2011 16:13:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-question/m-p/1589938#M592991</guid>
      <dc:creator>Kevin Melton</dc:creator>
      <dc:date>2011-01-31T16:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel question</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-question/m-p/1589939#M592992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you would like to send all traffic towards the VPN tunnel, then you do not need split tunnel. What you would need is called tunnelall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently under the vpn client group-policy, you would have the following 2 configuration lines for split tunneling:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;split-tunnel-policy tunnelspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;split-tunnel-network-list value &lt;EM&gt;split-tunnel&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would like to send all traffic towards the VPN tunnel, then you would need to &lt;EM&gt;change &lt;/EM&gt;the split tunnel policy to be as follows:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;split-tunnel-policy tunnelall&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and also remove the "split-tunnel-network-list value &lt;EM&gt;&lt;EM&gt;split-tunnel&lt;/EM&gt;&lt;/EM&gt;&lt;EM&gt;" command line.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are going to change it to tunnelall, how are you going to route the internet traffic from the remote vpn client pool subnet once it reaches the ASA? Will it go through an internal proxy server? or are you going to route it directly out from the ASA (u-turn on the outside interface)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are going to perform u-turn on the ASA for the internet traffic from the vpn client, then you would need to configure the following as well:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then assuming that you already have a "global (outside)" statement, you would need to configure the corresponding "nat (outside)" statement for the vpn client subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Jan 2011 16:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-question/m-p/1589939#M592992</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-31T16:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: Split Tunnel question</title>
      <link>https://community.cisco.com/t5/network-security/split-tunnel-question/m-p/1589940#M592993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jennifer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The question was hypothetical.&amp;nbsp; I was simply trying to understand the technology better.&amp;nbsp; We are not going to change anything at this time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your responses!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Jan 2011 16:42:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunnel-question/m-p/1589940#M592993</guid>
      <dc:creator>Kevin Melton</dc:creator>
      <dc:date>2011-01-31T16:42:42Z</dc:date>
    </item>
  </channel>
</rss>

