cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1425
Views
7
Helpful
7
Replies

dynamic split tunneling on ASA/Anyconnect using ISE radius attributes

Damien Zwart
Level 1
Level 1

Hi,

Does anyone know if it is possible to use Cisco ISE radius attributes to configure dynamic split tunneling .
We currently use split-tunnel for our vpn users, but it is based on ip adresses instead of domain names. Because of that we would like to use dynamic split tunneling so we can use URL's/domain names.

The Cisco article I found describes how to implement it using ASDM or CLI but since our preferred method is to use Cisco ISE radius attributes where the vpn user logs in and receives an authorization profile from ISE.
article I found:

https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215383-asa-anyconnect-dynamic-split-tunneling.html

Kind regards,
Damien

7 Replies 7

I dont get the Q totally
but you can use Split Domain under the one group-policy 
then config ISE to return this group-policy name to ASA which will use and hence you get dynamic Split.  

Hi MHM Cisco World,

Thank you for your answer. I will try to explain my situation:

I have added these configuration changes to make it work;

webvpn
anyconnect-custom-attr dynamic-split-include-domains description Dynamic Split Tunneling
!
anyconnect-custom-data dynamic-split-include-domains exampledomain www.exampledomain.com
!
group-policy EMPLOYEE attributes
anyconnect-custom dynamic-split-include-domains value exampledomain

And it works as expected. However it isn't according our current preferred design. It is preferred not to have these lines of configuration on the ASA's. The preferred situation is to let ISE add them as an attribute when the user logs in. 
We already use split tunneling based on ip by using an access-list and the attributes are pushed by ISE to the ASA's so we dont need those config lines on the ASA's.

Here's the ISE authorization profile for the split tunneling based on ip adress currently in use:



jurgen1.png

ernistnt123
Level 1
Level 1

Im looking for the same solution, how to integrate Dynamic Split-Tunneling with DACL from Cisco ISE. Is there way to have DACL dynamically changed based on Dynamic Split-Tunneling?

I see that the simplest option would be to use "permit any any" in the DACL, but I am concerned that a remote user may apply a route locally on their machine in order to access other IPs, potentially overriding split-tunneling configurations.

IMO these are two completely different concepts. DACLs control what traffic is allowed to your corporate network over the tunnel, while dynamic split tunneling and static split tunneling control what traffic is sent in clear to the Internet by the client. Hence you don't need to keep them in sync. For example, static split-include list can be configured to send 10/8 over the tunnel, but DACL can impose more strict restrictions on the traffic.

When it comes to original question, AnyConnect customer attributes (e.g. dynamic-split-exclude-domains) cannot be pushed from RADIUS server.

 

 

As far as I understand, the DACL (Downloadable Access Control List) is a crucial component pushed from Cisco ISE to the ASA. It dynamically appears on the Cisco ASA and is specifically assigned to AnyConnect users:

 
access-list #ACSACL#-IP-DACL_...

Meanwhile, the access list configured on the Cisco ASA and assigned to a user's tunnel settings comprises a list of routes applied on the VPN user's machine. It is called as SPLIT-TUNNELING acl.

Ensuring alignment between these two is vital. If the DACL from Cisco ISE doesn't include the new IP address after a dynamic tunnel IP change, the ASA might drop the traffic.

Certainly, you could opt for a "permit any any" setup on Cisco ISE and regulate user access solely via routes (from split-tunneling). In such cases, syncing split-tunneling and ACL might not be necessary.

However, a potential issue arises if a user manually adds additional routes on their machine while connected to the VPN, aiming to access resources over the VPN. This could conflict with the established routing policies and potentially lead to a security breach.

Nope. This is the other way around. You should never use "permit ip any any" DACL and instead should configure as strict DACL on ISE as possible. In this case users would never be able to circumvent your security policy. The static split-include ACL configured on the ASA and pushed down to the client can be relaxed, e.g. 10/8, etc. Hence it need not be in sync with DACL. The dynamic split ACL is typically deployed in a "dynamic split-exclude" form, to send traffic to specific FQDNs to the Internet in clear. Obviously, if it is configured like this, it relates to DACL as an apple to oranges.

 

First of all we use split-tunneling for only corporate or vendor internet sites. So we dont VPN ALL traffic thru corporate Cisco ASA. And that is fair as we have BYOD policy and client may have other applications which consume internet traffic and we dont want route it thru corporate network. So Split-Tunneling has to sync with DACL from Cisco ISE.

If we don't use "permit ip any any" in CIsco ISE then the Dynamic Split-Tunneling won't work. As if IP of domain changes a new route appears on client's machine but it won't go thru Cisco ASA as ASA drops it by the filter applied from CIsco ISE (DACL) which doesn't have a new IP.

   Filter Name : #ACSACL#-IP-DACL_xxx-xxx   <- comes from Cisco ISE