I have many users connecting to our HQ network via our ASA firewalls using their Cisco VPN Clients. The problem they have is they also have local networks which they need to have access to aswell, can the VPN client or ASA split the tunnel to they can still print to their local IP based printer etc and also get to resources over the VPN?
I have just followed your link and it didn't work, I am using a later version of the ASDM, so I will try the CLI later and see if it works. Do I have to do anything with the client as it has an option for local LAN access?
RADIUS and Symantec VIP.
I will use screenshots of ASDM, and at the end I will add the required CLI commands. the diagram below show a diagram of the steps the FW goes through when using 2FA authentication:
As you can see in Fig. 1&nbs...
Unable to get signature update from cisco.com
1. Make sure the router can get name resolution. Configure the router with a proper DNS name server.
ISR4451#utd threat-inspection signature update server cisco username xxxxx password yyyyy