Split Tunneling for VPN Clients on Cisco ASA

Configure the ASA 8.x with Adaptive Security Device Manager (ASDM) 6.x:

To allow split tunneling for the users in the group, follow these steps to configure your tunnel group

  1. Choose Configuration > Remote Access VPN > Network (Client) Access > Group Policies, and choose the Group Policy in which you want to enable local LAN access. Then click Edit.
  2. Click Split Tunneling.
  3. Uncheck the Inherit box for Split Tunnel Policy, and chose Tunnel Network List Below.
  4. Uncheck the Inherit box for Split Tunnel Network List, and then click Manage in order to launch the ACL Manager.
  5. Within the ACL Manager, choose Add > Add ACL… in order to create a new access list.
  6. Provide a name for the ACL, and click OK.
  7. Once the ACL is created, choose Add > Add ACE… in order to add an Access Control Entry (ACE).
  8. Define the ACE that corresponds to the LAN behind the ASA. In this case, the network is 192.168.10.0/24.
    • Click the Permit radio button.
    • Choose the network address with mask 192.168.10.0/24 .
    • (Optional) Provide a description.
    • Click OK
  9. Click OK in order to exit the ACL Manager.
  10. Be sure that the ACL you just created is selected for Split Tunnel Network List.
  11. Click OK in order to return to the Group Policy configuration.
  12. Click Apply and then Send (if required) in order to send the commands to the ASA.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s