Link to home
Start Free TrialLog in
Avatar of Adi Nuff
Adi Nuff

asked on

Cisco ASA5505 AnyConnect with Split tunnel not working

Hi,  I am unable to get the Split Tunnel functioanlitty to work with the ASA 5505 and the Any Connect VPN.   The client can connect fine, they can ping and access file shares through the tunnel but cannot browse the internet even though the split tunnel has been configured.  Please help, config is below, this not in prduction as yet and just in test phase.

ASA Version 8.4(3)
hostname ciscoasa
enable password t6ztMZU.rr3gsD1B encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
interface Ethernet0/0
 switchport access vlan 2
interface Ethernet0/1
interface Ethernet0/2
interface Ethernet0/3
interface Ethernet0/4
interface Ethernet0/5
interface Ethernet0/6
interface Ethernet0/7
interface Vlan1
 nameif inside
 security-level 100
 ip address
interface Vlan2
 nameif outside
 security-level 0
 ip address
ftp mode passive
object network obj_any
object network NETWORK_OBJ_192.168.200.0_24
object network NETWORK_OBJ_192.168.200.16_28
access-list vpn remark lan
access-list vpn standard permit
pager lines 24
logging asdm informational
mtu outside 1500
mtu inside 1500
ip local pool pips-pool mask
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
nat (inside,outside) source static NETWORK_OBJ_192.168.200.0_24 NETWORK_OBJ_192.168.200.0_24 destination static NETWORK_OBJ_192.168.200.16_28 NETWORK_OBJ_192.168.200.16_28 no-proxy-arp route-lookup
object network obj_any
 nat (inside,outside) dynamic interface
route outside 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server pips-ldap protocol ldap
aaa-server pips-ldap (inside) host
 timeout 5
 ldap-base-dn dc=pips,dc=local
 ldap-scope subtree
 ldap-naming-attribute sAMAccountName
 ldap-login-password *****
 ldap-login-dn support
 server-type microsoft
http server enable
http inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
telnet timeout 5
ssh timeout 5
console timeout 0

dhcpd auto_config outside
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
 enable outside
 anyconnect image disk0:/anyconnect-win-2.4.1012-k9.pkg 1
 anyconnect image disk0:/anyconnect-macosx-i386-2.4.1012-k9.pkg 2
 anyconnect enable
 tunnel-group-list enable
group-policy GroupPolicy_AnyConnect-vpn internal
group-policy GroupPolicy_AnyConnect-vpn attributes
 wins-server none
 dns-server value
 vpn-tunnel-protocol ssl-client ssl-clientless
 split-tunnel-policy tunnelall
 split-tunnel-network-list value vpn
 default-domain value pips.local
tunnel-group AnyConnect-vpn type remote-access
tunnel-group AnyConnect-vpn general-attributes
 address-pool pips-pool
 authentication-server-group pips-ldap
 default-group-policy GroupPolicy_AnyConnect-vpn
tunnel-group AnyConnect-vpn webvpn-attributes
 group-alias AnyConnect-vpn enable
class-map inspection_default
 match default-inspection-traffic
policy-map type inspect dns preset_dns_map
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny  
  inspect sunrpc
  inspect xdmcp
  inspect sip  
  inspect netbios
  inspect tftp
  inspect ip-options
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Avatar of fgasimzade
Flag of Azerbaijan image

You would need to add this command:

same-security-traffic permit intra-interface

and configure nat

object network obj_any
 nat (inside,outside) dynamic interface
nat (outside,outside) dynamic interface

Not sure if these NAT statements will work, I have never configured this on 8.4 version, only on previous versions
Avatar of Adi Nuff
Adi Nuff


Cheers, the cmds run fine but it has not made any difference, still have the same scenario VPN connects, ping and file access fine no Internet access.  thanks
Avatar of fgasimzade
Flag of Azerbaijan image

Link to home
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
yep that worked a treat, could you explain what i was doing wrong?  thanks
With tunnelall in place you sent all traffic from VPN user to ASA, including internet traffic

With tunnelspecified you specify an access list, which contains networks to be tunnel to ASA