<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL VPN AnyConnect with Split Tunnelling in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-vpn-anyconnect-with-split-tunnelling/m-p/1222985#M876972</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am unable to get split tunnelling working with Cisco ASA Version 8.0(4) and AnyConnect 2.3. (WinXp, SP3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tunnel works fine, and the SSL-VPN is great, &lt;/P&gt;&lt;P&gt;but traffic I wish to 'not' go via the tunnel (i.e anything other than 192.168.x.x) is still going via the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the config is very straight-forward ...&lt;/P&gt;&lt;P&gt;I have enabled split-tunnelling on both the group-policy and the default-group policy, but it still fails:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------------------&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-filter value VPN-DEV-ONLY&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLIT_ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy Matt-SSLGrpPol internal&lt;/P&gt;&lt;P&gt;group-policy Matt-SSLGrpPol attributes&lt;/P&gt;&lt;P&gt; re-xauth disable&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLIT_ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list SPLIT_ACL line 1 extended permit ip any 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;----------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any help would be be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume split tunnelling does work with AnnyConnect-SVC ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 14:44:41 GMT</pubDate>
    <dc:creator>mcroft</dc:creator>
    <dc:date>2019-03-11T14:44:41Z</dc:date>
    <item>
      <title>SSL VPN AnyConnect with Split Tunnelling</title>
      <link>https://community.cisco.com/t5/network-security/ssl-vpn-anyconnect-with-split-tunnelling/m-p/1222985#M876972</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am unable to get split tunnelling working with Cisco ASA Version 8.0(4) and AnyConnect 2.3. (WinXp, SP3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tunnel works fine, and the SSL-VPN is great, &lt;/P&gt;&lt;P&gt;but traffic I wish to 'not' go via the tunnel (i.e anything other than 192.168.x.x) is still going via the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the config is very straight-forward ...&lt;/P&gt;&lt;P&gt;I have enabled split-tunnelling on both the group-policy and the default-group policy, but it still fails:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------------------&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-filter value VPN-DEV-ONLY&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLIT_ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy Matt-SSLGrpPol internal&lt;/P&gt;&lt;P&gt;group-policy Matt-SSLGrpPol attributes&lt;/P&gt;&lt;P&gt; re-xauth disable&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLIT_ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list SPLIT_ACL line 1 extended permit ip any 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;----------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any help would be be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume split tunnelling does work with AnnyConnect-SVC ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-vpn-anyconnect-with-split-tunnelling/m-p/1222985#M876972</guid>
      <dc:creator>mcroft</dc:creator>
      <dc:date>2019-03-11T14:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: SSL VPN AnyConnect with Split Tunnelling</title>
      <link>https://community.cisco.com/t5/network-security/ssl-vpn-anyconnect-with-split-tunnelling/m-p/1222986#M876975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;split tunnel does work via anyconnect. If what you want is to prevent the 192.168.X.X net to be tunneled you need a different approach. In your case remember that the ACL you chose to use for split tunnel will be read in such a way that the source of that ACL is what will be pushed back to the client as the "Secure Routes" (what will be encrypted) In your case, you would need to use exclude specified:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s8.html#wp1404962" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s8.html#wp1404962&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 01:47:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-vpn-anyconnect-with-split-tunnelling/m-p/1222986#M876975</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-02-03T01:47:52Z</dc:date>
    </item>
  </channel>
</rss>

