06-21-2016 07:14 AM - edited 03-05-2019 04:16 AM
Hi, We have a Cisco ASA 5500 series Firewall where our employees connect via Cisco Anyconnect. Since then we used Split-Tunneling so our employees can connect to cloud based enterprise application without passing though our main link. However just recently we have another cloud base solution, this time it only allow one IP Address to connect to it. We put our external public gateway, it worked for employees in the office, but this solution is not working for employees that are around the world and always mobile. How can I force VPN clients to use our public gateway to access this cloud base solution, without removing the split-tunnel policy? I already put the exempt policy for the IP address but the routing stops in our Firewall. Any sample config will be very helpful and how to approach it. Thank you,
06-21-2016 01:51 PM
You need to add the destination IP address of the new service into the split tunnel list. You need need to configure the asa to nat this for (outside,outside) to your external public IP address that you want web browsing to come from, and you may need to create an access rule to allow this (the firewall logs are likely to tell you the answer).
06-21-2016 02:16 PM
Hi Philip,
Can you help with the an example. Just to put what you suggested in a configuration is this right?
Ex. Public IP: 8.8.8.7 (Public_IP)
VPN IP pool: 192.168.252.0/24
External IP: 9.9.9.253
* To include in the split-tunnel list
access-list vpnssl-split extended permit ip 8.8.8.7 255.255.255.255 192.168.252.0 255.255.255.0
* nat this for (outside,outside)
static (outside,outside) 8.8.8.7 9.9.9.253 netmask 255.255.255.255
* to create an access rule
access-list outsite_acl extended permit tcp any object-group Public_IP
Thanks,
Cornelio
11-04-2020 04:42 AM - edited 11-04-2020 04:51 AM
Hi Philip
I'm struggeling with the same issue and can't find it and must do something wrong. But with the later ASDM the above nat cli command doesn't work any more. Could you please point me into the right direction for managing this.
We use split tunnel anyconnect profile, and want to access an public url and because the whitelising on our office IP it needs to be tunneld into the ASA so that we access the website with out ASA's public IP.
All possible NAT rules which I've tried don't work.
Attached a screenshot from one of the nat tests (10.1.72.100-200) is the DHCP anyconnect scope VPN pool matching the acl's
Just tried to set it op with the website plain-text-ip.com which is 216.239.36.21 so see it it works and created an object external_test_url with this IP. And also put this IP in the splittunnel ACL and into the extended ACL for all ports.
Somehow i'm missing somewhere something.
Regards
Gert
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide