djhath
asked on
How to route traffic to Azure for Cisco AnyConnect VPN-connected users while split-tunneling is enabled
I am trying to secure access to our Azure environment by limiting IPs on the Azure firewall to the IP indigenous to our office.
For remote users, we use a Cisco AnyConnect VPN hosted from a Cisco ASA 5525 firewall on ASA version 9.1(7). Since we have split tunneling enabled, is there a way to route access to the Azure environment through our firewall so that Azure would identify users coming from the IP tied to our office?
For remote users, we use a Cisco AnyConnect VPN hosted from a Cisco ASA 5525 firewall on ASA version 9.1(7). Since we have split tunneling enabled, is there a way to route access to the Azure environment through our firewall so that Azure would identify users coming from the IP tied to our office?
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
I would recommend you search EE for Cisco hairpin VPNAnywhere