The last requirement from my previous post is controlling what kind of traffic a VPN user can send over the tunnel. On Cisco ASA you can easily add vpn-filter to the group policy: Asa1 ( config ) # group-policy MyGroup attributes Asa1 ( config - group - policy ) # vpn-filter acl_vpn but here with IOS we don’t have such possibility. The first solution is a radius server and configuration of downloadable ACLs per user. If you don’t have any external server you can change the config a bit and start using VTIs (Virtual Tunnel Interface) along with isakmp and ipsec profiles. Let’s start. First, I have to add the isakmp profile and match all the setting I configured previously under the crypto map: ! crypto isakmp profile ISAKMP - PRF match identity group CG client authentication list USERS isakmp authorization list AUTH - LIST client configuration address respond client configuration group CG virtual - template 1 ! Next I have to add the ipsec profile: ...