AnyConnect Remote Access VPN configurations with SPLIT-TUNNEL:
To make the concept and the working of the VPN I used the Cisco defined Image.
In this method the clients connected to the ASA through Cisco Any connect VPN can access the internal resources but will keep using own internet connection.
In this method the clients connected to the ASA through Cisco Any connect VPN can access the internal resources but will keep using own internet connection.
from router R ping 10.40.0.1 = success
Make sure the Firewall is reachable from remote client
To setup the Basic Firewall configurations please look into below
article.
VPN Configurations on ASA :>
ciscoasa(config)#ip local pool vpnpool 192.168.10.1-192.168.10.254 mask 255.255.255.0
ciscoasa(config)#webvpn
ciscoasa(config-webvpn)#enable outside
ciscoasa(config-webvpn)#anyconnect image disk0:/anyconnect-win-3.1.05152-k9.pkg 1
ciscoasa(config-webvpn)#tunnel-group-list enable
ciscoasa(config-webvpn)#anyconnect enable
ciscoasa(config)#access-list REMOTE standard permit 192.168.1.0 255.255.255.0
ciscoasa(config)#access-list REMOTE standard permit 192.168.10.0 255.255.255.0
ciscoasa(config)#group-policy clientgroup internal
ciscoasa(config)#group-policy clientgroup attributes
ciscoasa(config-group-policy)#vpn-tunnel-protocol ssl-client
ciscoasa(config-group-policy)#split-tunnel-policy tunnelspecified
ciscoasa(config-group-policy)#split-tunnel-network-list value REMOTE
ciscoasa(config)#username Babar password cisco
ciscoasa(config)#tunnel-group sslgroup type remote-access
ciscoasa(config)#ip local pool vpnpool 192.168.10.1-192.168.10.254 mask 255.255.255.0
ciscoasa(config)#webvpn
ciscoasa(config-webvpn)#enable outside
ciscoasa(config-webvpn)#anyconnect image disk0:/anyconnect-win-3.1.05152-k9.pkg 1
ciscoasa(config-webvpn)#tunnel-group-list enable
ciscoasa(config-webvpn)#anyconnect enable
ciscoasa(config)#access-list REMOTE standard permit 192.168.1.0 255.255.255.0
ciscoasa(config)#access-list REMOTE standard permit 192.168.10.0 255.255.255.0
ciscoasa(config)#group-policy clientgroup internal
ciscoasa(config)#group-policy clientgroup attributes
ciscoasa(config-group-policy)#vpn-tunnel-protocol ssl-client
ciscoasa(config-group-policy)#split-tunnel-policy tunnelspecified
ciscoasa(config-group-policy)#split-tunnel-network-list value REMOTE
ciscoasa(config)#username Babar password cisco
ciscoasa(config)#tunnel-group sslgroup type remote-access
ciscoasa(config)#tunnel-group sslgroup general-attributes
ciscoasa(config-tunnel-general)#address-pool vpnpool
ciscoasa(config-tunnel-general)#default-group-policy clientgroup
ciscoasa(config-tunnel-general)#exit
ciscoasa(config)#tunnel-group sslgroup webvpn-attributes
ciscoasa(config-tunnel-webvpn)#group-alias sslgroup_users enable
Now
try connecting to 10.0.50.1 on client using AnyConnect and it should connect.
But ping 192.168.1.2 from client will not work because we have not configured
the NAT exception yet.
object network NET_OBJ_192.168.1.0_24
subnet 192.168.1.0 255.255.255.0
object network NET_OBJ_192.168.10.0_24
subnet 192.168.10.0 255.255.255.0
nat (inside,outside) source static NET_OBJ_192.168.1.0_24 NET_OBJ_192.168.1.0_24 destination static NET_OBJ_192.168.10.0_24 NET_OBJ_192.168.10.0_24
subnet 192.168.1.0 255.255.255.0
object network NET_OBJ_192.168.10.0_24
subnet 192.168.10.0 255.255.255.0
nat (inside,outside) source static NET_OBJ_192.168.1.0_24 NET_OBJ_192.168.1.0_24 destination static NET_OBJ_192.168.10.0_24 NET_OBJ_192.168.10.0_24
Now the VPN is fully UP and ping is working from both
sides.
on client if we do “tracert
192.168.1.2” reply is coming directly from the host through tunnel. and if we
do “tracert 10.0.30.1” reply is coming via client’s own internet called
split tunneling.
Tips
· > Access-list
is optional we just used it for security purpose so only the network specified
in the ACL can communicate. it can be configured without ACL.
· > " same-security-traffic
permit (intra-interface,inter-interface )" is not required in this VPN.
· > Make
sure to not copy the commands directly from the webpage to firewall. First copy
the commands on the notepad read the command and type it manually on the
Firewall.
Note: I personally configured and tested this lab and its working and the ASA version is 9.5(2).
-------------------------------------------------The END----------------------------------------------------------
Nice Article,
ReplyDeletePerfect
ReplyDelete