Solved

Cisco AnyConnect Mobility Client

Posted on 2014-03-09
7
100 Views
Last Modified: 2015-09-25
I have Cisco AnyConnect Secure Mobility Client install to connect to my VPN network to access the applications of my company.
Also my PC is configured for the company proxy access via VPN to access Internet Websites through company proxy.

I would like to bypass proxy access for a particular URL & not go through the Cisco AnyConnect Secure VPN.

It can be achieved by making changes in the PAC file to bypass the URL access.
But that has to make changes centrally.

Would like to know is there any other way by which we will be able to bypass the proxy & VPN.
Is there any settings at Cisco AnyConnect Secure Mobility Client level not to send the traffic via VPN & bypass proxy..
0
Comment
Question by:SrikantRajeev
  • 4
  • 3
7 Comments
 
LVL 34

Expert Comment

by:Istvan Kalmar
ID: 39917073
Hi,

If you using clientless VPN you able to do it without sending traffic via VPN tunnel!
0
 
LVL 1

Author Comment

by:SrikantRajeev
ID: 39917222
how to do it
0
 
LVL 34

Expert Comment

by:Istvan Kalmar
ID: 39917825
0
Create the perfect environment for any meeting

You might have a modern environment with all sorts of high-tech equipment, but what makes it worthwhile is how you seamlessly bring together the presentation with audio, video and lighting. The ATEN Control System provides integrated control and system automation.

 
LVL 1

Author Comment

by:SrikantRajeev
ID: 39920016
it does not address my query.
0
 
LVL 34

Expert Comment

by:Istvan Kalmar
ID: 39920282
Do you want to config split tunnel?

Please provide us your config
0
 
LVL 1

Accepted Solution

by:
SrikantRajeev earned 0 total points
ID: 39949625
I am not looking for Split tunnel.
0
 
LVL 1

Author Closing Comment

by:SrikantRajeev
ID: 41002627
Thanks
0

Featured Post

MIM Survival Guide for Service Desk Managers

Major incidents can send mastered service desk processes into disorder. Systems and tools produce the data needed to resolve these incidents, but your challenge is getting that information to the right people fast. Check out the Survival Guide and begin bringing order to chaos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question