For example, if you want to allow VPN traffic to the range 192.168.1.1 - 192.168.1.5, you could create a network list such as:
Then either configure this Network List as the local network in LAN to LAN configuration or in group configuration for remote access VPN connections. In group configuration, go to the Client Config tab. Enable Split Tunneling and specify the list you just created as the Split Tunneling Network List. With this configuration a remote VPN client can access 192.168.1.1 - 192.168.1.5 and still access the internet and other resources using their local LAN.
And i appriciate your answer, but by this way i can configure 5 ip address either deny or allow, additionaly with this configuration i want that no any other ip should access my VPN concentrator other than my configured ip address.
So i wan to allow 5 ip and deny all other...
as my VPN Concentrator is gateway of my office LAN.
If you want to only allow 5 addresses to access your concentrator to setup VPN sessions, you can go to Configuration -> Policy Management -> Traffic Management. Create a rule that allows only a given network list. Create a filter with a default action of Drop and assign the rule you created to the filter. Then assign the filter to your remote access group(s) using the General tab in group configuration.
If you want to limit the IP addresses that can access the administration interface of your concentrator, go to Administration -> Access Rights -> Access Control List and add the addresses that should be allowed access to manager the concentrator.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...