Configure AnyConnect Client Access to Local LAN (2024)

    Introduction

    This document describes how to allow the Cisco AnyConnect Secure Mobility Client to access the local LAN while connected to a Cisco ASA.

    Prerequisites

    Requirements

    This document assumes that a functional remote access VPN configuration already exists on the Cisco Adaptive Security Appliance (ASA).

    Refer to CLI Book 3: Cisco ASA Series VPN CLI Configuration Guide, 9.17 for configuration assistance if needed.

    Components Used

    The information in this document is based on these software and hardware versions:

    • Cisco ASA 5500 Series Version 9(2)1
    • Cisco Adaptive Security Device Manager (ASDM) Version 7.1(6)
    • Cisco AnyConnect Secure Mobility Client Version 3.1.05152

    The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.

    Network Diagram

    The client is located on a typical Small Office / Home Office (SOHO) network and connects across the Internet to the main office.

    Configure AnyConnect Client Access to Local LAN (1)

    Background Information

    This configuration allows the Cisco AnyConnect Secure Mobility Client secure access to corporate resources via IPsec, Secure Sockets Layer (SSL), or Internet Key Exchange Version 2 (IKEv2) and still gives the client the ability to carry out activities such as printing where the client is located. If it is permitted, traffic destined for the Internet is still tunneled to the ASA.

    Unlike a classic split tunneling scenario in which all Internet traffic is sent unencrypted, when you enable local LAN access for VPN clients, it permits those clients to communicate unencrypted with only devices on the network on which they are located. For example, a client that is allowed local LAN access while connected to the ASA from home can print to its own printer but cannot access the Internet unless it first sends the traffic over the tunnel.

    An access list is used in order to allow local LAN access in much the same way that split tunneling is configured on the ASA. However, unlike the split tunneling scenario, this access list does not define which networksmust beencrypted. Instead, it defines which networks must not beencrypted. Also, unlike the split tunneling scenario, the actual networks in the list do not need to be known. Instead, the ASA supplies a default network of 0.0.0.0/255.255.255.255, which is understood to mean the local LAN of the client.

    Configure AnyConnect Client Access to Local LAN (2)

    Note: This is not a configuration for split tunneling where the client has unencrypted access to the Internet while connected to the ASA. Refer toSet the Split-Tunneling Policy in CLI Book 3: Cisco ASA Series VPN CLI Configuration Guide, 9.17 for information on how to configure split tunneling on the ASA.

    Note: When the client is connected and configured for local LAN access, youcannot print or browse by nameon the local LAN. However, you can browse or print by IP address. See theTroubleshootsection of this document for more information as well as workarounds for this situation.

    Configure Local LAN Access forthe AnyConnect Secure Mobility Client

    Complete these tasks in order to allow Cisco AnyConnect Secure Mobility Clients access to their local LAN while connected to the ASA:

    • Configure the ASA via the ASDM orConfigure the ASA via the CLI
    • Configure the Cisco AnyConnect Secure Mobility Client

    Configure the ASA via the ASDM

    Complete these steps in the ASDM in order to allow VPN clients to have local LAN access while connected to the ASA:

    1. Choose Configuration > Remote Access VPN> Network (Client) Access > Group Policy and select the Group Policy in which you wish to enable local LAN access. Then click Edit.

      Configure AnyConnect Client Access to Local LAN (3)

    2. Go to Advanced > Split Tunneling.

      Configure AnyConnect Client Access to Local LAN (4)

    3. Uncheck the Inherit box for Policy and choose Exclude Network List Below.

      Configure AnyConnect Client Access to Local LAN (5)

    4. Uncheck the Inherit box for Network List and then click Manage in order to launch the Access Control List (ACL) Manager.

      Configure AnyConnect Client Access to Local LAN (6)

    5. Within the ACL Manager, choose Add > Add ACL... in order to create a new access list.

      Configure AnyConnect Client Access to Local LAN (7)

    6. Provide a name for the ACL and click OK.

      Configure AnyConnect Client Access to Local LAN (8)

    7. Once the ACL is created, choose Add > Add ACE... in order to add an Access Control Entry (ACE).

      Configure AnyConnect Client Access to Local LAN (9)

    8. Define the ACE that corresponds to the local LAN of the client.
      1. Choose Permit.
      2. Choose an IP Address of 0.0.0.0
      3. Choose a Netmask of /32.
      4. (Optional) Provide a description.
      5. Click OK.

        Configure AnyConnect Client Access to Local LAN (10)

    9. Click OK in order to exit the ACL Manager.

      Configure AnyConnect Client Access to Local LAN (11)

    10. Be sure that the ACL you just created is selected for the Split Tunnel Network List.

      Configure AnyConnect Client Access to Local LAN (12)

    11. Click OK in order to return to the Group Policy configuration.

      Configure AnyConnect Client Access to Local LAN (13)

    12. Click Apply and then Send (if required) in order to send the commands to the ASA.

      Configure AnyConnect Client Access to Local LAN (14)

    Configure the ASA via the CLI

    Rather than use the ASDM, you can complete these steps in the ASA CLI in order to allow VPN clients to have local LAN access while connected to the ASA:

    1. Enter configuration mode.
      ciscoasa>enable
      Password:
      ciscoasa#configure terminal
      ciscoasa(config)#
    2. Create the access list in order to allow local LAN access.
      ciscoasa(config)#access-list Local_LAN_Access remark Client Local LAN Access
      ciscoasa(config)#access-list Local_LAN_Access standard permit host 0.0.0.0
    3. Enter the Group Policy configuration mode for the policy that you wish to modify.
      ciscoasa(config)#group-policy hillvalleyvpn attributes
      ciscoasa(config-group-policy)#
    4. Specify the split tunnel policy. In this case, the policy is excludespecified.
      ciscoasa(config-group-policy)#split-tunnel-policy excludespecified
    5. Specify the split tunnel access list. In this case, the list is Local_LAN_Access.
      ciscoasa(config-group-policy)#split-tunnel-network-list value Local_LAN_Access
    6. Issue this command:
      ciscoasa(config)#tunnel-group hillvalleyvpn general-attributes
    7. Associate the group policy with the tunnel group.
      ciscoasa(config-tunnel-ipsec)# default-group-policy hillvalleyvpn
    8. Exit the two configuration modes.
      ciscoasa(config-group-policy)#exit
      ciscoasa(config)#exit
      ciscoasa#
    9. Save the configuration to non-volatile RAM (NVRAM) and press Enter when prompted to specify the source filename.
      ciscoasa#copy running-config startup-config

      Source filename [running-config]?
      Cryptochecksum: 93bb3217 0f60bfa4 c36bbb29 75cf714a

      3847 bytes copied in 3.470 secs (1282 bytes/sec)
      ciscoasa#

    Configure the Cisco AnyConnect Secure Mobility Client

    In order to configure the Cisco AnyConnect Secure MobilityClient, refer to theConfigure AnyConnect Connectionssection of CLI Book 3: Cisco ASA Series VPN CLI Configuration Guide, 9.17.

    Split-exclude tunneling requires that you enable AllowLocalLanAccess in the AnyConnect Client. All split-exclude tunneling is regarded as local LAN access. In order to use the exclude feature of split-tunneling, you must enable the AllowLocalLanAccess preference in the AnyConnect VPN Client preferences. By default, local LAN access is disabled.

    In order to allow local LAN access, and therefore split-exclude tunneling, a network administrator can enable it in the profile or users can enable it in their preferences settings (see the image in the next section). In order to allow local LAN access, a user selects the Allow Local LAN access check box if split-tunneling is enabled on the secure gateway and is configured with the split-tunnel-policy exclude specified policy. In addition, you can configure the VPN Client Profile if local LAN access is allowed with <LocalLanAccess UserControllable="true">true</LocalLanAccess>.

    User Preferences

    Here are the selections that you must make in the Preferences tab on the Cisco AnyConnect Secure Mobility Client in order to allow local LAN access.

    Configure AnyConnect Client Access to Local LAN (15)

    On Linux

    Configure AnyConnect Client Access to Local LAN (16)

    XML Profile Example

    Here is an example of how to configure the VPN Client Profile with XML.

    <?xml version="1.0" encoding="UTF-8"?>
    <AnyConnectProfile xmlns="http://schemas.xmlsoap.org/encoding/"
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://schemas.xmlsoap.org/encoding/ AnyConnectProfile.xsd">
    <ClientInitialization>
    <UseStartBeforeLogon UserControllable="true">false</UseStartBeforeLogon>
    <AutomaticCertSelection UserControllable="true">false</AutomaticCertSelection>
    <ShowPreConnectMessage>false</ShowPreConnectMessage>
    <CertificateStore>All</CertificateStore>
    <CertificateStoreOverride>false</CertificateStoreOverride>
    <ProxySettings>Native</ProxySettings>
    <AllowLocalProxyConnections>true</AllowLocalProxyConnections>
    <AuthenticationTimeout>12</AuthenticationTimeout>
    <AutoConnectOnStart UserControllable="true">false</AutoConnectOnStart>
    <MinimizeOnConnect UserControllable="true">true</MinimizeOnConnect>
    <LocalLanAccess UserControllable="true">true</LocalLanAccess>
    <ClearSmartcardPin UserControllable="true">true</ClearSmartcardPin>
    <IPProtocolSupport>IPv4,IPv6</IPProtocolSupport>
    <AutoReconnect UserControllable="false">true
    <AutoReconnectBehavior UserControllable="false">DisconnectOnSuspend
    </AutoReconnectBehavior>
    </AutoReconnect>
    <AutoUpdate UserControllable="false">true</AutoUpdate>
    <RSASecurIDIntegration UserControllable="false">Automatic
    </RSASecurIDIntegration>
    <WindowsLogonEnforcement>SingleLocalLogon</WindowsLogonEnforcement>
    <WindowsVPNEstablishment>LocalUsersOnly</WindowsVPNEstablishment>
    <AutomaticVPNPolicy>false</AutomaticVPNPolicy>
    <PPPExclusion UserControllable="false">Disable
    <PPPExclusionServerIP UserControllable="false"></PPPExclusionServerIP>
    </PPPExclusion>
    <EnableScripting UserControllable="false">false</EnableScripting>
    <EnableAutomaticServerSelection UserControllable="false">false
    <AutoServerSelectionImprovement>20</AutoServerSelectionImprovement>
    <AutoServerSelectionSuspendTime>4</AutoServerSelectionSuspendTime>
    </EnableAutomaticServerSelection>
    <RetainVpnOnLogoff>false
    </RetainVpnOnLogoff>
    </ClientInitialization>
    </AnyConnectProfile>

    Verify

    Complete the steps in these sections in order to verify your configuration:

    • View the DART
    • Test Local LAN Access with Ping

    Connect your Cisco AnyConnect Secure Mobility Client to the ASA in order to verify your configuration.

    1. Choose your connection entry from the server list and click Connect.

      Configure AnyConnect Client Access to Local LAN (17)

    2. Choose Advanced Window for All Components > Statistics... in order to display the Tunnel Mode.

      Configure AnyConnect Client Access to Local LAN (18)

      On Linux

      Configure AnyConnect Client Access to Local LAN (19)

    3. Click the Route Details tab in order to see the routes to which the Cisco AnyConnect Secure Mobility Clientstill has local access.

      In this example, the client is allowed local LAN access to 10.150.52.0/22 and 169.254.0.0/16 while all other traffic is encrypted and sent across the tunnel.

      Configure AnyConnect Client Access to Local LAN (20)

    On Linux

    Configure AnyConnect Client Access to Local LAN (21)

    Cisco AnyConnect Secure Mobility Client

    When you examine the AnyConnect logs from the Diagnostics and Reporting Tool (DART) bundle, you can determine whether or not the parameter that allows local LAN access is set.

    ******************************************

    Date : 11/25/2011
    Time : 13:01:48
    Type : Information
    Source : acvpndownloader

    Description : Current Preference Settings:
    ServiceDisable: false
    CertificateStoreOverride: false
    CertificateStore: All
    ShowPreConnectMessage: false
    AutoConnectOnStart: false
    MinimizeOnConnect: true
    LocalLanAccess: true
    AutoReconnect: true
    AutoReconnectBehavior: DisconnectOnSuspend
    UseStartBeforeLogon: false
    AutoUpdate: true
    RSASecurIDIntegration: Automatic
    WindowsLogonEnforcement: SingleLocalLogon
    WindowsVPNEstablishment: LocalUsersOnly
    ProxySettings: Native
    AllowLocalProxyConnections: true
    PPPExclusion: Disable
    PPPExclusionServerIP:
    AutomaticVPNPolicy: false
    TrustedNetworkPolicy: Disconnect
    UntrustedNetworkPolicy: Connect
    TrustedDNSDomains:
    TrustedDNSServers:
    AlwaysOn: false
    ConnectFailurePolicy: Closed
    AllowCaptivePortalRemediation: false
    CaptivePortalRemediationTimeout: 5
    ApplyLastVPNLocalResourceRules: false
    AllowVPNDisconnect: true
    EnableScripting: false
    TerminateScriptOnNextEvent: false
    EnablePostSBLOnConnectScript: true
    AutomaticCertSelection: true
    RetainVpnOnLogoff: false
    UserEnforcement: SameUserOnly
    EnableAutomaticServerSelection: false
    AutoServerSelectionImprovement: 20
    AutoServerSelectionSuspendTime: 4
    AuthenticationTimeout: 12
    SafeWordSofTokenIntegration: false
    AllowIPsecOverSSL: false
    ClearSmartcardPin: true

    ******************************************

    Test Local LAN Access with Ping

    An additional way to test that the VPN Client still has local LAN access while tunneled to the VPN headend is to use the ping command at the Microsoft Windows command line. Here is an example where the local LAN of the client is 192.168.0.0/24 and another host is present on the network with an IP address of 192.168.0.3.

    C:\>ping 192.168.0.3
    Pinging 192.168.0.3 with 32 bytes of data&colon;

    Reply from 192.168.0.3: bytes=32 time<1ms TTL=255
    Reply from 192.168.0.3: bytes=32 time<1ms TTL=255
    Reply from 192.168.0.3: bytes=32 time<1ms TTL=255
    Reply from 192.168.0.3: bytes=32 time<1ms TTL=255

    Ping statistics for 192.168.0.3:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
    Approximate round trip times in milli-seconds:
    Minimum = 0ms, Maximum = 0ms, Average = 0ms

    On Linux

    Configure AnyConnect Client Access to Local LAN (22)

    Troubleshoot

    This section provides information you can use in order to troubleshoot your configuration.

    Unable to Print or Browse by Name

    When the VPN Client is connected and configured for local LAN access, you cannot print or browse by name on the local LAN. There are two options available in order to work around this situation:

    • Browse or print by IP address.
      • In order to browse, instead of the syntax \\sharename, use the syntax \\x.x.x.x where x.x.x.x is the IP address of the host computer.
      • In order to print, change the properties for the network printer in order to use an IP address instead of a name. For example, instead of the syntax \\sharename\printername, use \\x.x.x.x\printername, where x.x.x.x is an IP address.
    • Create or modify the VPN Client LMHOSTS file. An LMHOSTS file on a Microsoft Windows PC allows you to create static mappings between hostnames and IP addresses. For example, an LMHOSTS file can look like this:
      192.168.0.3 SERVER1192.168.0.4 SERVER2192.168.0.5 SERVER3

      In Microsoft Windows XP Professional Edition, the LMHOSTS file is located in %SystemRoot%\System32\Drivers\Etc. Refer to your Microsoft documentation for more information.

    Related Information

    • CLI Book 3: Cisco ASA Series VPN CLI Configuration Guide, 9.17
    • Cisco ASA 5500-X Series Firewalls
    Configure AnyConnect Client Access to Local LAN (2024)
    Top Articles
    How to Finally Get Your Credit Score Above 800
    How Much Does Credit Repair Cost?
    Will Byers X Male Reader
    Is Sam's Club Plus worth it? What to know about the premium warehouse membership before you sign up
    Fat Hog Prices Today
    123 Movies Black Adam
    Devon Lannigan Obituary
    Maria Dolores Franziska Kolowrat Krakowská
    1970 Chevrolet Chevelle SS - Skyway Classics
    Terraria Enchanting
    Ati Capstone Orientation Video Quiz
    Mustangps.instructure
    Umn Pay Calendar
    Best Cav Commanders Rok
    Ave Bradley, Global SVP of design and creative director at Kimpton Hotels & Restaurants | Hospitality Interiors
    Chicken Coop Havelock Nc
    Rhinotimes
    Dr Manish Patel Mooresville Nc
    Classic | Cyclone RakeAmerica's #1 Lawn and Leaf Vacuum
    Axe Throwing Milford Nh
    Craigslist Pearl Ms
    Bòlèt Florida Midi 30
    Globle Answer March 1 2023
    48 Oz Equals How Many Quarts
    Ticket To Paradise Showtimes Near Cinemark Mall Del Norte
    Robotization Deviantart
    Jesus Calling Feb 13
    Ncal Kaiser Online Pay
    Rs3 Bring Leela To The Tomb
    Hoofdletters voor God in de NBV21 - Bijbelblog
    Play 1v1 LOL 66 EZ → UNBLOCKED on 66games.io
    Orange Pill 44 291
    One Credit Songs On Touchtunes 2022
    John F Slater Funeral Home Brentwood
    Ewwwww Gif
    Why Holly Gibney Is One of TV's Best Protagonists
    Magicseaweed Capitola
    Kelley Blue Book Recalls
    Leena Snoubar Net Worth
    T&Cs | Hollywood Bowl
    The best specialist spirits store | Spirituosengalerie Stuttgart
    Craigslist Food And Beverage Jobs Chicago
    Courtney Roberson Rob Dyrdek
    Www Craigslist Com Atlanta Ga
    Craigslist Antique
    Blue Beetle Showtimes Near Regal Evergreen Parkway & Rpx
    15 Best Places to Visit in the Northeast During Summer
    bot .com Project by super soph
    Craigslist Free Cats Near Me
    Wieting Funeral Home '' Obituaries
    Latest Posts
    Article information

    Author: Nicola Considine CPA

    Last Updated:

    Views: 5703

    Rating: 4.9 / 5 (49 voted)

    Reviews: 80% of readers found this page helpful

    Author information

    Name: Nicola Considine CPA

    Birthday: 1993-02-26

    Address: 3809 Clinton Inlet, East Aleisha, UT 46318-2392

    Phone: +2681424145499

    Job: Government Technician

    Hobby: Calligraphy, Lego building, Worldbuilding, Shooting, Bird watching, Shopping, Cooking

    Introduction: My name is Nicola Considine CPA, I am a determined, witty, powerful, brainy, open, smiling, proud person who loves writing and wants to share my knowledge and understanding with you.