Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hello We are on anyconnect 4.9 and ASA 5516. When users are connected to VPN using anyconnect, we want to maintain split tunneling and deny access to their local Lan (or access to corporate laptop from local lan), is this possible?
We can into a strange problem. As above, it's a simple S2S VPN tunnel. On our side, Node1 is primary, Node2 is secondary but connection is always established through cluster IP. There was a failover, so Node2 is primary and Node 1 is secondary. Im...
We are on Cisco ASA 5516. There is an interface 10.50.70.0/23 on the firewall and it has outbound access list set to 'permit any'. But there is no NAT configured for this interface. Yet, systems behind this interface are able to access internet, how ...
it's a simple split tunnel. In the ACL we added some corporate subnets. group-policy SSLVPN internalgroup-policy SSLVPN attributesdns-server value 20.1.1.1dhcp-network-scope 20.200.65.0vpn-tunnel-protocol ssl-clientgroup-lock value SSLVPNsplit-tu...
I jumped the gun! I looked at the asdm logs and assumed the packets are going through. ACL allowed everything, hence the logs, but on the end host interent access didn't work. Thank you again!