11-12-2018 10:48 AM - edited 02-21-2020 09:30 PM
Our Remote Access VPN configuration is setup to allow split-tunnelling to the Internet from the client machine. Cisco Anyconnect Secure Mobility Client encrypts all RFC1918 networks and tunnels them. While all other traffic (email, casual browsing etc.) is sent unencrypted. However due to this setup, our clients are not able to print to their local printers. I understand this is because of the above mentioned configuration which tunnels all RFC1918 networks (which also include local LAN networks) to the ASA. Is there a workaround we can use while still utilizing split-tunnelling where all internet based traffic splits right from the client’s local LAN and all corporate traffic is tunnelled?
11-12-2018 12:46 PM
Hello Ricky,
I hope you are doing great,
You could allow the "Allow local LAN access on the anyconnect or XML file"
<LocalLanAccess UserControllable="true">true</LocalLanAccess>.
This way you can still have access to your Local LAN, whether you have exclude specified or include specified.
keep me posted, on this.
Please qualify all of the helpful answers and mark as answered if this was the answer required,
Regards,
David Castro,
11-12-2018 01:05 PM
11-12-2018 01:27 PM
Hello Ricky,
This scenario would likely work with exlude specified but it can create a big ACL excluding all of the public ranges and the printers IPs individually, you could try the following:
When the VPN Client is connected and configured for local LAN access, you cannot print or browse by name on the local LAN. There are two options available in order to work around this situation:
192.168.0.3 SERVER1 192.168.0.4 SERVER2 192.168.0.5 SERVER3
Also explore the exclude specify option, which allows you to exclude what should not go through the tunnel and allow the rest of it being encrypted,
Keep me posted,
Please rate all helpful posts,
Thanks,
David Castro,
04-30-2019 03:08 PM
In addition to enabling "Allow local (LAN) access..." and presuming you are configured to "tunnel network list below", add 0.0.0.0/32 with a deny to your split tunnel network list ACL. I largely used this article, but modified it to allow specifying addresses that I specifically want to tunnel rather than excluding addresses I did not tunnel (i.e. almost the entire Internet).
04-13-2022 08:52 AM
@wmarkeles A very late reply and I apologize but this resolved the issue. We are now able to print locally while still tunneling only specific subnets.
0.0.0.0/32 deny did the trick.
Thanks again
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide