Link to home
Start Free TrialLog in
Avatar of ROMAD77
ROMAD77Flag for United States of America

asked on

ASA 5505 VPN - Split Tunneling

Hello All,

I am having an issue with my ASA 5505 that I hope will be an easy fix for the experts here. To begin with the VPN configured on the ASA is working beautifully. The problem is with split tunneling. If I connect with a Windows 7 machine, no problem. I am able to connect to the Exchange Server, File Servers, etc. on the remote network, AND browse the Internet on the local network. However, when I connect to the VPN with Windows XP machines, I am unable to browse locally while connected to the VPN (but I do have access to machines on the remote network). Has anyone else experienced this?
See running config below:

ASA Version 7.2(4)
!
hostname ciscoasa
domain-name corp.local
enable password 6ixjCp2UhkTENv27 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.100.250 255.255.255.0
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 96.x.x.x 255.255.248
!
interface Vlan3
 shutdown
 no forward interface Vlan1
 nameif dmz
 security-level 50
 no ip address
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
ftp mode passive
dns server-group DefaultDNS
 domain-name corp.local
same-security-traffic permit intra-interface
access-list ChexarVPN_splitTunnelAcl standard permit any
access-list inside_nat0_outbound extended permit ip any 192.168.100.224 255.255.255.240
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu dmz 1500
ip local pool VPNpool 192.168.100.225-192.168.100.234 mask 255.255.255.0
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
route outside 0.0.0.0 0.0.0.0 96.x.x.x 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
http server enable
http 192.168.100.0 255.255.255.0 inside
http 192.168.1.0 255.255.255.0 inside
http 0.0.0.0 0.0.0.0 outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto dynamic-map outside_dyn_map 20 set pfs group1
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA
crypto dynamic-map outside_dyn_map 40 set pfs group1
crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
crypto isakmp ipsec-over-tcp port 10000
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!

group-policy ChexarVPN internal
group-policy ChexarVPN attributes
 banner value Chexar Networks, Inc.
 banner value Corporate Use Only
 dns-server value 192.168.100.10 192.168.100.12
 vpn-access-hours none
 vpn-simultaneous-logins 5
 vpn-idle-timeout none
 vpn-session-timeout none
 vpn-tunnel-protocol IPSec l2tp-ipsec
 password-storage disable
 ip-comp enable
 group-lock value ChexarVPN
 pfs disable
 ipsec-udp enable
 ipsec-udp-port 10000
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value ChexarVPN_splitTunnelAcl
 default-domain value corp.local
 msie-proxy method auto-detect
 address-pools value VPNpool
 client-firewall none
username darryl password D7pbkoI.yXMCzM.6 encrypted privilege 0
username darryl attributes
 vpn-group-policy ChexarVPN
 vpn-tunnel-protocol IPSec l2tp-ipsec
 group-lock value ChexarVPN
username bjcrapps password DBfXHHrJl4o.xxXr encrypted privilege 0
username bjcrapps attributes
 vpn-group-policy ChexarVPN
 vpn-tunnel-protocol IPSec l2tp-ipsec
 group-lock value ChexarVPN
tunnel-group ChexarVPN type ipsec-ra
tunnel-group ChexarVPN general-attributes
 address-pool VPNpool
 default-group-policy ChexarVPN
tunnel-group ChexarVPN ipsec-attributes
 pre-shared-key *
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:86f6e7a51c59558e0eb11ff44552fb89
: end
asdm image disk0:/asdm-524.bin
no asdm history enable
ASKER CERTIFIED SOLUTION
Avatar of Jody Lemoine
Jody Lemoine
Flag of Canada image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of ROMAD77

ASKER

That was it! I modified the default ACL created during the wizard as you suggested and all is well. I'm still confused as to how/why the Win7 box was working, but oh well....