1-56
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Connection Profiles, Group Policies, and Users
Group Policies
If you use extended ACLs, the source network determines the split-tunneling network. The destination
network is ignored. In addition, because
any
is not an actual IP address or network address, do not use
the term for the source in the ACL.
The
value
access-list name
parameter identifies an access list that enumerates the networks to tunnel or
not tunnel. The access list can be a unified ACL with ACEs that specify both IPv4 and IPv6 addresses.
The
none
keyword indicates that there is no network list for split tunneling; the ASA tunnels all traffic.
Specifying the
none
keyword sets a split tunneling network list with a null value, thereby disallowing
split tunneling. It also prevents inheriting a default split tunneling network list from a default or specified
group policy.
To delete a network list, enter the
no
form of this command. To delete all split tunneling network lists,
enter the
no split-tunnel-network-list
command without arguments. This command deletes all
configured network lists, including a null list if you created one by entering the
none
keyword.
When there are no split tunneling network lists, users inherit any network lists that exist in the default
or specified group policy. To prevent users from inheriting such network lists, enter the
split-tunnel-network-list none
command.
The following example shows how to set a network list called FirstList for the group policy named
FirstGroup:
hostname(config)#
show runn group-policy FirstGroup attributes
hostname(config-group-policy)#
split-tunnel-network-list value FirstList
Run the
show runn group-policy attributes
command to verify your configuration. This example
shows that the administrator has set both an IPv4 and IPv6 network policy and used the network list
(unified ACL),
FirstList
for both policies.
hostname(config-group-policy)#
show runn group-policy FirstGroup attributes
group-policy FirstGroup attributes
split-tunnel-policy tunnelspecified
ipv6-split-tunnel-policy tunnelspecified
split-tunnel-network-list value FirstList
Configuring Domain Attributes for Tunneling
You can specify a default domain name for tunneled packets or a list of domains to be resolved through
the split tunnel. This section describes how to set these domains and includes the following topics:
Defining a Default Domain Name for Tunneled Packets
The ASA passes the default domain name to the IPsec client to append to DNS queries that omit the
domain field. When there are no default domain names, users inherit the default domain name in the
default group policy. To specify the default domain name for users of the group policy, enter the
default-domain
command in group-policy configuration mode. To delete a domain name, enter the
no
form of this command.
hostname(config-group-policy)#
default-domain
{
value
domain-name
|
none
}
hostname(config-group-policy)#
no default-domain
[
domain-name
]
The
value
domain-name
parameter identifies the default domain name for the group. To specify that
there is no default domain name, enter the
none
keyword. This command sets a default domain name
with a null value, which disallows a default domain name and prevents inheriting a default domain name
from a default or specified group policy.
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......