0

I don't find a way to set up split tunneling.

I basically need to use VPN to access certain websites behind a firewall and not to use VPN for anything not in the firewall. With Cisco AnyConnect Secure Mobility Client, I can either use the VPN or not to use it. I don't see a way to set for what domains and IP addresses to use VPN and for what domains and IP addresses not to use VPN.

It seems that my Cisco AnyConnect Secure Mobility Client is a customized version by my administrator (I am not quite sure. Can an administrator customize the software so that it will disable split tunneling?)

In that case, is there no way to set up split tunneling on Mac OS X while the VPN is on?

user1424739
  • 1,879
  • 2
  • 12
  • 9
  • Here some examples,which can be helpfull - https://documentation.meraki.com/MX/Client_VPN/Configuring_Split_Tunnel_Client_VPN – batistuta09 Aug 20 '19 at 14:01
  • I can't see a similar screenshot of Mac OS X on the webpage that you showed. There is nothing called "Client VPN" on my System Preferences > Network. – user1424739 Aug 20 '19 at 16:10
  • Your VPN connection can have a different name. Connect to VPN and check networks – batistuta09 Aug 21 '19 at 13:07

1 Answers1

0

You will need to talk to your network administrator. The split tunneling feature is configured on the security appliance (Cisco ASA presumably), not on the AnyConnect client side.

When you are connect to the VPN either Cisco AnyConnect chooses to either (a) route all your traffic through the tunnel, or (b) split only traffic destined for networks on the other end of the tunnel.

There is an AnyConnect option on the client side to "Allow Local LAN Access", but this only allows your computer to see other devices, such as printers and whatnot, on your LAN (but not beyond).

Unless your network admin(s) want to create a custom connection for you with split tunneling, all traffic normally routed to your internet gateway will be sent through the tunnel. The rationale is that your network admins can filter / protect your web traffic to reduce an attack vector .. versus allowing you to connect insecurely to the internet at large while at the same time being connected as a remote node to the secure corp network. This creates a serious security vulnerability.

pmagwood
  • 21
  • 4