cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
638
Views
0
Helpful
2
Replies

ALLOW INTERNET ACCESS WHILE ANYCONNECT

ciscolunero
Level 1
Level 1

Hi,

I dont know how to allow internet access while cisco anyconnect clients are connected. I´m new with VPN connections and I´m totally lost here.

Please could anybody help with this? Many, many thanks in advance.

: Serial Number: JAD19220344
: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)
:
ASA Version 9.4(1)
!
hostname ciscoasa
enable password WmlxhdtfAnw9XbcA encrypted
passwd ta.qizy4R//ChqQH encrypted
names
ip local pool Pool_139 139.16.1.50-139.16.1.80 mask 255.255.255.0
ip local pool Pool_172 172.16.1.100-172.16.1.130 mask 255.255.255.0
!
interface GigabitEthernet1/1
nameif outside
security-level 0
ip address 192.168.1.100 255.255.255.0
!
interface GigabitEthernet1/2
nameif inside
security-level 100
ip address 139.16.1.1 255.255.255.0
!
interface GigabitEthernet1/3
nameif DMZ
security-level 50
ip address 172.16.1.1 255.255.255.0
!
interface GigabitEthernet1/4
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/5
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/6
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/7
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/8
shutdown
no nameif
no security-level
no ip address
!
interface Management1/1
management-only
nameif management
security-level 100
ip address 11.11.11.11 255.255.255.0
!
ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
dns domain-lookup inside
dns domain-lookup DMZ
dns server-group DefaultDNS
name-server 172.16.1.69
name-server 8.8.8.8
object network obj_any
subnet 0.0.0.0 0.0.0.0
object network inside-subnet
subnet 139.16.1.0 255.255.255.0
object network dmz-subnet
subnet 172.16.1.0 255.255.255.0
object network wialon-server-external-ip
host 192.168.1.132
object network wialon-server
host 172.16.1.69
object service Wialon-services-TCP
service tcp source range 1 65535 destination range 20100 21999
object service Wialon-services-UDP
service udp source range 20100 21999 destination range 20100 21999
object network NETWORK_OBJ_139.16.1.0_25
subnet 139.16.1.0 255.255.255.128
object network wialon-server-ssl
host 172.16.1.69
object service wialon-ssl
service tcp source range 1 65535 destination eq 555
object network wialon-server-20981
host 172.16.1.69
object network wialon-server-20981UDP
host 172.16.1.69
object service walon-ssl2
service tcp source range 1 65535 destination eq 556
object-group service DM_INLINE_SERVICE_1
service-object tcp destination eq www
service-object udp destination eq domain
service-object tcp destination eq https
access-list outside_acl extended permit tcp any object wialon-server eq www
access-list outside_acl extended permit object Wialon-services-TCP any object wialon-server
access-list outside_acl extended permit object Wialon-services-UDP any object wialon-server
access-list outside_acl extended permit object wialon-ssl any object wialon-server
access-list outside_acl extended permit object walon-ssl2 any object wialon-server
access-list DMZ_access_in extended permit ip object wialon-server 139.16.1.0 255.255.255.0
access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_1 any any
pager lines 24
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu DMZ 1500
mtu management 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (DMZ,outside) source static any any destination static NETWORK_OBJ_139.16.1.0_25 NETWORK_OBJ_139.16.1.0_25 route-lookup
nat (inside,outside) source static any any destination static NETWORK_OBJ_139.16.1.0_25 NETWORK_OBJ_139.16.1.0_25 no-proxy-arp route-lookup
!
object network obj_any
nat (any,outside) dynamic interface
object network inside-subnet
nat (inside,outside) dynamic interface
object network wialon-server
nat (DMZ,outside) static wialon-server-external-ip
access-group outside_acl in interface outside
access-group DMZ_access_in in interface DMZ
route outside 0.0.0.0 0.0.0.0 192.168.1.1 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
user-identity default-domain LOCAL
http server enable
http 11.11.11.0 255.255.255.0 management
http 139.16.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
service sw-reset-button
crypto ipsec ikev2 ipsec-proposal AES256
protocol esp encryption aes-256
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
protocol esp encryption aes-192
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
protocol esp encryption aes
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
protocol esp encryption 3des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal DES
protocol esp encryption des
protocol esp integrity sha-1 md5
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto ca trustpoint ASDM_TrustPoint0
enrollment self
fqdn ciscoasa.srdongato.null
email lunero@gmail.com
subject-name CN=srdongato
serial-number
proxy-ldc-issuer
crl configure
crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_0
enrollment self
fqdn none
subject-name CN=139.16.1.1,CN=ciscoasa
keypair ASDM_LAUNCHER
crl configure
crypto ca trustpool policy
crypto ca certificate chain ASDM_TrustPoint0
certificate 09836256
30820381 30820269 a0030201 02020409 83625630 0d06092a 864886f7 0d010105
05003050 31123010 06035504 03130973 72646f6e 6761746f 313a3012 06035504
05130b4a 41443139 32323033 34343024 06092a86 4886f70d 01090216 17636973
636f6173 612e7372 646f6e67 61746f2e 6e756c6c 301e170d 31353132 30353036
33333535 5a170d32 35313230 32303633 3335355a 30503112 30100603 55040313
09737264 6f6e6761 746f313a 30120603 55040513 0b4a4144 31393232 30333434
30240609 2a864886 f70d0109 02161763 6973636f 6173612e 7372646f 6e676174
6f2e6e75 6c6c3082 0122300d 06092a86 4886f70d 01010105 00038201 0f003082
010a0282 010100d2 295e679c 153e8b6a d3f6131d 8ea646e3 aa0a5fa9 20e49259
ca895563 7e818047 033a4e8f 57f619e9 fa93bfd5 6c44141f b0abf2c0 8b86334e
bac63f41 99e6d676 c689dcf7 080f2715 038a8e1b 694a00de 7124565e a1948f09
8dbeffab c7c8a028 741c5b10 d0ede5e9 599f38fe 5b88f678 4decdc4b 353b6708
cfa2fbce f58be06e 18feba56 4b2b04a1 77773ec6 5c58d2ed d7ca4f17 980f0353
138bfe65 1b1165e6 7b6f94bb ab4d4286 e900178c 147a6dba 2427f38e e225030f
0a66d1eb 5075c57e 6d77e5bb 247f5bc3 8d3530f0 49dedf2d 21a24b5f daa08d98
690183cf e82a6b8d 5e489956 c5eecdbc 7fc2365c b629a52b 126b51e2 18590ed5
c9da8503 a639f102 03010001 a3633061 300f0603 551d1301 01ff0405 30030101
ff300e06 03551d0f 0101ff04 04030201 86301f06 03551d23 04183016 80143468
dec79103 0a91b530 1ada7e47 7e27b16d 4186301d 0603551d 0e041604 143468de
c791030a 91b5301a da7e477e 27b16d41 86300d06 092a8648 86f70d01 01050500
03820101 003cdb04 8ef5ed31 c05c684b ad2b0062 96bfd39a ecb0a3fe 547aebe5
14b753e7 89f55827 3d4e0aa8 b8674e45 80d4c023 8e99a7b4 0907d347 060a2fe4
fa6e0c2f 3b9cd708 a539c09f 7022d2ee fb6e2cf6 82b0e861 a2839a71 1512b3ec
e28664e9 732270c9 d1c679d9 1eaf2ad5 007b5699 31c3ff97 09aae869 88677a3d
ecb3032e 2dd0f74f 81f9a8fb 79f30809 723bbdbf dfef4154 5ad6b012 a8f37093
481fa678 23390036 b44b0290 042828f3 5eefdc43 78934455 ebe52d26 9b4234a9
bfeebc43 731c4146 166e5adc b431f12f 8d0fbf16 46306228 34d76984 d2e6ebbc
96838694 88ca120a d4f32884 963e7385 987ec6b0 dfa28d49 05ba5fa8 641bcfc7
ff92ac3c 52
quit
crypto ca certificate chain ASDM_Launcher_Access_TrustPoint_0
certificate 0a836256
308202cc 308201b4 a0030201 0202040a 83625630 0d06092a 864886f7 0d010105
05003028 3111300f 06035504 03130863 6973636f 61736131 13301106 03550403
130a3133 392e3136 2e312e31 301e170d 31353132 30353036 35363236 5a170d32
35313230 32303635 3632365a 30283111 300f0603 55040313 08636973 636f6173
61311330 11060355 0403130a 3133392e 31362e31 2e313082 0122300d 06092a86
4886f70d 01010105 00038201 0f003082 010a0282 010100e7 a5c16e86 16c15a10
e018b868 bac7271a 30f1a3f8 ecb9c6b8 3ed4b1ad c9468f5e 287f2a7a 644f1496
c43a061e da927d09 a755b53e ed7c6a66 f2f1fb1e f944345c 86e08ce0 891c99b3
13101ab3 04963fad f91f987f 99f22a89 cd1e8c5a 5e4c026d 2cadd7b7 6620bbd1
b4a5135b 24ec886f fa061a06 dd536e96 1e483730 756c4101 23f83a8d 944a7fbe
93c51d56 32ac0d17 ceb75f63 0ae24f07 f2c54e83 5b84ff00 16b0b899 c925c737
1765b066 23b54645 bc419684 d09dd130 c1479949 68b0a779 df39b078 6fb0deb9
758b14c3 f0801faf f0ad60e1 a018ffba d769f867 3fe8e5fc 88ccc5b2 2319f5d4
617a78c4 74e7a64b 5c68276c 06ea57c1 d0ffce4b 358c4d02 03010001 300d0609
2a864886 f70d0101 05050003 82010100 dff97c9f 4256fd47 8eb661fd d22ecea4
589eff09 958e01f1 a435a20e 5ed1cf19 af42e54d d61fc0ab cb2ee7ac 7fcb4513
1a44cc86 1e020d72 3a3f78d2 4d225177 857093d9 f5fcf3c7 6e656d2b 54a0c522
f636b8cf 33c5ae34 ea340f32 85dff4c1 50165e7a e94de10b ced15752 0b3a76c1
20291106 2a50777b a1a8a214 8a003716 680c15d4 ac3f7cc7 378f8f5f 38e3403f
f958c095 e549c8ed 4baf8cc5 bdcd230e 260754ea 953c3a4c eb01fef5 62b97e01
9f82ce6b f479dbdd 000c45af 8758b35f b4a958ee 32c4db3f 2ddc7385 dc05b0e3
78b609ba a9280841 2433ae87 5dd7a7c2 d5691068 1dc0eddc c23f99c5 3df8b1a5
aadbd82a 423f4ba8 563142bf 742771c3
quit
crypto ikev2 policy 1
encryption aes-256
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 10
encryption aes-192
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 20
encryption aes
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 30
encryption 3des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 40
encryption des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 enable outside client-services port 443
crypto ikev2 remote-access trustpoint ASDM_TrustPoint0
crypto ikev2 remote-access trustpoint ASDM_Launcher_Access_TrustPoint_0
telnet 139.16.1.0 255.255.255.0 inside
telnet 11.11.11.0 255.255.255.0 management
telnet timeout 5
no ssh stricthostkeycheck
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
dhcpd auto_config outside
!
dhcpd address 172.16.1.69-172.16.1.69 DMZ
dhcpd dns 87.216.1.65 87.216.1.66 interface DMZ
dhcpd option 3 ip 172.16.1.1 interface DMZ
dhcpd enable DMZ
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ssl trust-point ASDM_Launcher_Access_TrustPoint_0 outside
ssl trust-point ASDM_Launcher_Access_TrustPoint_0 inside
ssl trust-point ASDM_Launcher_Access_TrustPoint_0 DMZ
ssl trust-point ASDM_Launcher_Access_TrustPoint_0 inside vpnlb-ip
webvpn
enable outside
enable inside
enable DMZ
anyconnect image disk0:/anyconnect-win-4.2.01022-k9.pkg 1
anyconnect image disk0:/anyconnect-win-3.1.12020-k9.pkg 2
anyconnect profiles Wialon_client_profile disk0:/Wialon_client_profile.xml
anyconnect profiles dongato_client_profile disk0:/dongato_client_profile.xml
anyconnect enable
tunnel-group-list enable
error-recovery disable
group-policy GroupPolicy_dongato internal
group-policy GroupPolicy_dongato attributes
wins-server none
dns-server value 172.16.1.69 8.8.8.8
vpn-tunnel-protocol ikev2 ssl-client
default-domain none
webvpn
anyconnect profiles value dongato_client_profile type user
group-policy GroupPolicy_Wialon internal
group-policy GroupPolicy_Wialon attributes
wins-server none
dns-server value 192.168.1.1
vpn-tunnel-protocol ikev2 ssl-client ssl-clientless
default-domain none
webvpn
anyconnect profiles value Wialon_client_profile type user
group-policy VPN internal
dynamic-access-policy-record DfltAccessPolicy
username dongato1 password c7qapEnn4RfoDLr4 encrypted
username wialon_1 password Wy2aFpAQTXQavfJD encrypted
username wialon_2 password 4STJ9bvyWxOTxIyH encrypted
tunnel-group Wialon type remote-access
tunnel-group Wialon general-attributes
address-pool Pool_139
default-group-policy GroupPolicy_Wialon
tunnel-group Wialon webvpn-attributes
group-alias Wialon enable
tunnel-group dongato type remote-access
tunnel-group dongato general-attributes
address-pool Pool_139
default-group-policy GroupPolicy_dongato
tunnel-group dongato webvpn-attributes
group-alias dongato enable
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:d735f2c6defeba3ab9d217a6c1d55b90
: end

 

2 Replies 2

shahab.66
Level 1
Level 1

Please clarify if you want to let the users use the internet from their VPN access or the internet on their Local Site:

If you want to route all of their traffic through the VPN tunnel (Not my personal preference) you should try NAT and If you want the local Internet be used for them you should try Split tunneling and Split DNS features

Regards, 

Thanks, I want to use local internet for them so I´m trying with split tunneling.

Kind regards.

Review Cisco Networking for a $25 gift card