01-10-2023 10:56 AM
Hello.
When routing split tunnel traffic inside the Anyconnect VPN-- in addition to the split-tunnel ACL, must I also create a standard ACL "permit" statement for this newly authorized traffic on the existing ACLs on the inside and outside interfaces?
Thank you.
Solved! Go to Solution.
01-10-2023 10:59 AM - edited 01-10-2023 11:00 AM
@jmaxwellUSAF as default VPN traffic is permitted with the pre-configured command "sysopt connection permit-vpn" configured, thus the interface ACL is ignored. So no you don't need to explictly permit this traffic, unless you've unconfigured the default command.
01-10-2023 11:07 AM
friend
I know the name confuse you but split-acl is not ACL and not apply to any interface in ASA,
it called split-acl but it actually is route add to client.
for ACL you need for VPN it depend
1- sysop connection permit-vpn
2- you apply any ACL IN to INside interface
01-10-2023 10:59 AM - edited 01-10-2023 11:00 AM
@jmaxwellUSAF as default VPN traffic is permitted with the pre-configured command "sysopt connection permit-vpn" configured, thus the interface ACL is ignored. So no you don't need to explictly permit this traffic, unless you've unconfigured the default command.
01-10-2023 11:07 AM
friend
I know the name confuse you but split-acl is not ACL and not apply to any interface in ASA,
it called split-acl but it actually is route add to client.
for ACL you need for VPN it depend
1- sysop connection permit-vpn
2- you apply any ACL IN to INside interface
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide