The Cisco AnyConnect Roaming Security module is designed to work with almost all AnyConnect VPN modes with no extra configuration required.
However, additional consideration when these conditions are BOTH true:
- Split Tunnelling is enabled
- AND 'Tunnel All DNS' feature is enabled.
Problem and Impact
With 'Tunnel All DNS' enabled, DNS traffic is intercepted at the kernel level and blocked if it is not going out of the correct VPN interface. This introduces a problem for the Roaming Client if Cisco Umbrella resolvers are not part of the Split DNS configuration.
The impact of this problem is minimal, because by default the Roaming Module uses encrypted DNS (UDP port 443) which is not blocked by 'Tunnel All DNS'. Therefore the problem only occurs on networks where DNS encryption is not available.
The scenario is as follows:
- The Roaming Module attempts to route traffic to Umbrella via the normal LAN interface.
- The Local Network does not allow DNS encryption, and therefore sends standard unencrypted DNS queries.
- This traffic is blocked by the 'Tunnel All DNS' feature
In this scenario DNS does not function as expected.
To ensure this condition is not possible we would recommend one of the following actions:
- Disable 'Tunnel All DNS' in the VPN group policy. The Roaming Module will handle the routing of DNS.
- OR add the Cisco Umbrella DNS resolvers to the Split Tunnel configuration:
184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124.