Have a usecase where Cisco Any Connect (version 4.x) is required to reach an internal website utalizing a configured VPN connection.
Installation and all is just fine, however just after authentication and I suppose at the network handshake stage, Workspaces kicks you out, disconnect the session and is unable to reconnect.
Connecting back in, requires a restart of the environment through the AWS Admin console - after the restart, the image is at the last best state, which is prior to CAC installation.
→ Is there something that I can do to get this working, or a using VPN inside WorkSpaces not possible?
Thanks
Theoretically, this should be doable. The issue you’re facing is because once you connect to VPN, all workspace traffic is tunneled through the VPN server.
I haven’t done it before but I’d look for how to tunnel only HTTP/HTTPS traffic through VPN (instead of all traffic).
You need split tunnelling for this. Make sure the management subnet is not routed through your VPN virtual interface.
I have seen it done several times. It all comes down to how the VPN is configured. Workspaces have two interfaces. One is for traffic on your side, the other is for all of the streaming and management traffic. A common mistake I see in these setups is that the VPN is not properly configured with split-tunneling / blocks traffic on the managed side.
Ideally, for setups like this, you would want the tunnel outside of the workspace and to route specific traffic across a persistent tunnel as needed. If that’s not an option, it is possible to get any connect working.