cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
701
Views
1
Helpful
14
Replies

How to configure Cisco to access some sites through secured routes

alex lascu
Level 1
Level 1

Hello.

I have a Cisco Firepower 1000 configured with SPLIT VPN.
I want to be able to access 2 external websites through CiscoASA (just as the internal servers in my company are accessed) and all other connections to the Internet to be able to access them as before through my home Internet provider
Thanks for any suggestions.

14 Replies 14

Pavan Gundu
Cisco Employee
Cisco Employee

If your external websites have fixed public IP addresses, you can just include them in your SPLIT ACL entries. If they are not fixed, and they change, you can use the AnyConnect Dynamic Split Include feature which is shown in the link below

https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect410/administration/guide/b-anyconnect-admin-guide-4-10/configure_vpn.html#task_v4x_ydm_pbb

Thanks for your answers.
My external websites do not have fixed public IP addresses.
I added in dynamic-split-include-domains list, and I can see these sites are added in anyconnect in the "Dynamic Tunnel Inclussion" but I can't access them via HTTP or PING.
All other sites are working.

What I am doing wrong?

I think I must read more.

Have you also added a NAT rule for U-Turn traffic as mentioned earlier by MHM.

I tried but I probably don't understand exactly what to do. I'm still reading about U-Turn

You need split VPN with u-turn NATing 

I read and tried some scenarios without success.
Can you be a little more clear?
Thanks!

alex lascu
Level 1
Level 1

Thanks

I try to follow the guide but something is missing or I don't understand.
I have added 2 network objects as in the screenshots below.
My Cisco ASA internal IP is 172.17.200.118 and the IP obtained by anyconnect is 10.10.20.45.

 

sorry late reply 

there are three category of NAT, 
which one you select, you must select network object 
Screenshot (52).png

Thanks for your answer.

Yes. I added those rules with Add "Network Object" Nat rule(please see the captures bellow)

 

alexlascu_1-1688972531606.png

 

alexlascu_0-1688972483339.png

 

rules.jpg

friend 
what these IP you use in object group ??
10.10....
172.17.....

172.17.0.0/32 is the network range from the internal company network.

172.17.200.118 is the internal IP of Cisco Firepower.

10.10.20.0/24 is the VPN POOL that is given to the Anyconnect clients

Pavan Gundu
Cisco Employee
Cisco Employee

When you are connected to the headend, is the client able to talk to internet? i.e. does ping 8.8.8.8 work for the client?

Posting the output of `sh run nat` would also help

Thanks for your answer.

When I am connected to the internal VPN I can ping 8.8.8.8 and I can browse any site except for the ones included in Dynamic Tunnel inclusion.

Please see bellow some captures from Anyconnect and "sh run nat' output.

nat.pngroute details.pngstatistics.png