<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Split tunneling question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3375244#M960559</link>
    <description>&lt;P&gt;No that is part of the configuration for hairpinning the VPN traffic out to the internet. in addition to this you need the command &lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For changing the configuration to tunnel-all you would need to change the group-policy configuration&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;group-policy AnyConnect_GrpPolicy internal&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;group-policy AnyConnect_GrpPolicy attributes&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; split-tunnel-policy tunnelall&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;tunnel-group AnyConnect type remote-access&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;tunnel-group AnyConnect general-attributes&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; default-group-policy AnyConnect_GrpPolicy&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 30 Apr 2018 07:44:40 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2018-04-30T07:44:40Z</dc:date>
    <item>
      <title>Split tunneling question</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3374986#M960556</link>
      <description>&lt;P&gt;We were using a split-tunnelling in our office. So users got office network and internet using their own home network. We need to use office network and internet using the office network.We need to monitor internet traffic also in Cisco ASA of VPN-users.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:40:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3374986#M960556</guid>
      <dc:creator>vishnuvichu36601</dc:creator>
      <dc:date>2020-02-21T15:40:58Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling question</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3375022#M960557</link>
      <description>&lt;P&gt;Just set up the AnyConnect VPN to tunnel all traffic then configure a dynamic NAT policy for outside to outside for the AnyConnect subnet.&amp;nbsp; now you should be able to see the connections through the ASA.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Apr 2018 09:39:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3375022#M960557</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-04-29T09:39:09Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling question</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3375189#M960558</link>
      <description>&lt;PRE&gt;nat (outside,outside) &lt;STRONG&gt;source static obj-AnyconnectPool obj-AnyconnectPool destination&lt;BR /&gt; static obj-AnyconnectPool obj-AnyconnectPool&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;this is the configuration you are talking about?turn off the split-tunelling and tunelling all.???? &lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 03:03:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3375189#M960558</guid>
      <dc:creator>vishnuvichu36601</dc:creator>
      <dc:date>2018-04-30T03:03:22Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling question</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3375244#M960559</link>
      <description>&lt;P&gt;No that is part of the configuration for hairpinning the VPN traffic out to the internet. in addition to this you need the command &lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For changing the configuration to tunnel-all you would need to change the group-policy configuration&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;group-policy AnyConnect_GrpPolicy internal&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;group-policy AnyConnect_GrpPolicy attributes&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; split-tunnel-policy tunnelall&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;tunnel-group AnyConnect type remote-access&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;tunnel-group AnyConnect general-attributes&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; default-group-policy AnyConnect_GrpPolicy&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 07:44:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3375244#M960559</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-04-30T07:44:40Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling question</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3375270#M960560</link>
      <description>&lt;P&gt;group-policy AnyConnect_GrpPolicy internal&lt;/P&gt;
&lt;P&gt;group-policy AnyConnect_GrpPolicy attributes&lt;/P&gt;
&lt;P&gt;&amp;nbsp; split-tunnel-policy tunnelall&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tunnel-group AnyConnect type remote-access&lt;/P&gt;
&lt;P&gt;tunnel-group AnyConnect general-attributes&lt;/P&gt;
&lt;P&gt;&amp;nbsp; default-group-policy AnyConnect_GrpPolicy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After this we need to write a NAT policy for outside for VPN Network to access internal network and office internet without using Client home ISP&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 08:45:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3375270#M960560</guid>
      <dc:creator>vishnuvichu36601</dc:creator>
      <dc:date>2018-04-30T08:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling question</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3375271#M960561</link>
      <description>&lt;P&gt;That is correct.&amp;nbsp; Keep in mind that you also need the command &lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Apr 2018 08:48:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3375271#M960561</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-04-30T08:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling question</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3376469#M960563</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Current senario we configured "same-security-traffic permit inter-interface".Can we configure both in asa same-security-traffic permit inter and intra interface?&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Test plan is that.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Create a new group-policy and applied tunnel all and do a dynamic nat for vpn subnet outside outside.Is this step ok for testing???please help&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 May 2018 08:53:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3376469#M960563</guid>
      <dc:creator>vishnuvichu36601</dc:creator>
      <dc:date>2018-05-02T08:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling question</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3376571#M960565</link>
      <description>&lt;P&gt;you can have both same-security-traffic permit inter-interface and same-security-traffic permit intra-interface configured at the same time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Create a new group-policy and applied tunnel all and do a dynamic nat for vpn subnet outside outside.Is this step ok for testing???&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Yes, this plus the same-security-traffic permit intra-interface command will allow hairpinning for AnyConnect.&lt;/P&gt;</description>
      <pubDate>Wed, 02 May 2018 12:22:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-question/m-p/3376571#M960565</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-05-02T12:22:05Z</dc:date>
    </item>
  </channel>
</rss>

