I want to lock down some vpn client users in a particular group that connect to our router to be able to only access RDP on a server. I cannot seem to get this to work through a split tunnel ACL for the group :
It seems that the way the split tunnel ACL specifies the source and destination subnets (they are reversed for split tunneling) that it can't support a destination TCP port on the LAN ? ( I have tried the ACL many other ways and I can't get it to work)
IS there any way to make it work with a split tunnel ACL or do I just have to configure different vpn client subnets for each group and filter them on an interface ACL ?
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...