cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1326
Views
0
Helpful
8
Replies

RV340: Can't print to my local LAN printer when connected SSL VPN

BradH21
Level 1
Level 1

Hi there,

 

When I am connected (via Anyconnect 4.9) to our SSL VPN on our RV340, I cannot reach my local network printer.  To remedy this, I enabled split tunneling and allowed access to my local LAN (192.168.1.0).  With this set up, I can ping my own computer's local IP address (192.168.1.150), and my local gateway (192.168.1.254) *only*.  Any other IP address including my printer (192.168.1.225) doesn't work.  I did a tracert, and for my gateway and PC, it goes straight to their 192.168.1.x addresses.  But when I ping my printer, it goes out to my VPN IP (192.168.5.1) and then breaks down somewhere on the internet after a few hops.

 

What am I missing here?  Is there a way to get access to my full local LAN when connected to the VPN?

8 Replies 8

balaji.bandi
Hall of Fame
Hall of Fame

split-tunnel should work,  (what IP you get from VPN ?)  show route will help us.

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

192.168.5.23 is my VPN IP.

can you post route print from your PC when you connect to VPN?

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Sure and many thanks for helping me.  Much appreciated.  I can reach the printer if I add a route to my PC to force it through my local gateway, but yeah, I'd rather not have to do that.  I don't get why it lets me ping the gateway or myself but not anything else.

 

Network Destination Netmask Gateway Interface Metric
0.0.0.0  0.0.0.0 192.168.1.254 192.168.1.175 281
8.8.8.8 255.255.255.255 192.168.1.254 192.168.1.175 26
75.157.xxx.xx 255.255.255.255 192.168.1.254 192.168.1.175 26
127.0.0.0 255.0.0.0 On-link 127.0.0.1 331
127.0.0.1 255.255.255.255 On-link 127.0.0.1 331
127.255.255.255 255.255.255.255 On-link 127.0.0.1 331
192.168.0.0 255.255.255.0 On-link 192.168.5.27 2
192.168.0.255 255.255.255.255 On-link 192.168.5.27 257
192.168.1.0 255.255.255.0 On-link 192.168.1.175 281
192.168.1.0 255.255.255.0 On-link 192.168.5.27 2
192.168.1.175 255.255.255.255 On-link 192.168.1.175 281
192.168.1.254 255.255.255.255 On-link 192.168.1.175 26
192.168.1.255 255.255.255.255 On-link 192.168.1.175 281
192.168.1.255 255.255.255.255 On-link 192.168.5.27 257
192.168.5.27 255.255.255.255 On-link 192.168.5.27 257
192.168.20.1 255.255.255.255 On-link 192.168.5.27 2
192.168.20.200 255.255.255.255 On-link 192.168.5.27 2
224.0.0.0 240.0.0.0 On-link 127.0.0.1 331
224.0.0.0 240.0.0.0 On-link 192.168.1.175 281
224.0.0.0 240.0.0.0 On-link 192.168.5.27 10000
255.255.255.255 255.255.255.255 On-link 127.0.0.1 331
255.255.255.255 255.255.255.255 On-link 192.168.1.175 281
255.255.255.255 255.255.255.255 On-link 192.168.5.27 10000

May be wrong here - but your route shows this :

 

192.168.1.0 255.255.255.0 On-link 192.168.5.27 2  (Lower metric)

 

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Hello,

 

can you post a couple of screenshots showing how you set up the split tunneling ? Make sure it looks like the setup described in the link below...

 

https://www.cisco.com/c/en/us/support/docs/smb/routers/cisco-rv-series-small-business-routers/smb5553-configure-anyconnect-virtual-private-network-vpn-connectivit.html

nagrajk1969
Spotlight
Spotlight

Hi 

 

try configuring on the sslvpn server (in the sslvpnprofile) as in screenshot. Maybe it will solve your issue

 

Many thanks!  So in your example you have it set to exclude traffic.. the Cisco example had it including.  That may well be where I went wrong!!

Review Cisco Networking for a $25 gift card