<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco pix 501 split tunnelling in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-pix-501-split-tunnelling/m-p/733148#M1001625</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry its taken a couple of days to come back to you. I firstly tried just ticking the box in the pdm that allows split-tunneling. which allowed my vista pc's to access the vpn and the internet but not the xp ones! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way for anyone thinking about ticking that box in the pdm it then stops access to the pdm and you need to make any other changes by the command line. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone know why this is ? &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;I've tried the solution posted here and while the dns gets resolved the user still cannot access the internet while on the vpn. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll include my config in case its been a typo. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any more advice would be welcome. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks &lt;/P&gt;&lt;P&gt;Suzanne&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 25 Jul 2007 14:12:18 GMT</pubDate>
    <dc:creator>techsitc10</dc:creator>
    <dc:date>2007-07-25T14:12:18Z</dc:date>
    <item>
      <title>Cisco pix 501 split tunnelling</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-split-tunnelling/m-p/733144#M1001621</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have several clients accessing their office via vpn, I wish to grant them access to the internet at the same time through their home internet connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the easiest route to enable split tunnelling? I'm unsure what I need to add to the config file apart from;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I presume that I need to define tunnelspecified as the internal network of the office?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;P&gt;Suzanne&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:47:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-split-tunnelling/m-p/733144#M1001621</guid>
      <dc:creator>techsitc10</dc:creator>
      <dc:date>2019-03-11T10:47:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco pix 501 split tunnelling</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-split-tunnelling/m-p/733145#M1001622</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Suzanne&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you need to define the corporate network with an access-list to enable split tunnelling. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is a link to configuring split tunnelling on ASA using either ASDM or the CLI. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080702999.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080702999.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2007 21:11:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-split-tunnelling/m-p/733145#M1001622</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-07-22T21:11:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco pix 501 split tunnelling</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-split-tunnelling/m-p/733146#M1001623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for that prompt reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I should have said I'm using a PIX 501 running 6.3  and have PDM 3.0, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;which means that the split-tunnel-policy tunnelall command fails and there are not the same options in the gui?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is it possible on the pix 501 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Suzanne&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2007 08:29:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-split-tunnelling/m-p/733146#M1001623</guid>
      <dc:creator>techsitc10</dc:creator>
      <dc:date>2007-07-23T08:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco pix 501 split tunnelling</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-split-tunnelling/m-p/733147#M1001624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for your case here are the steps:&lt;/P&gt;&lt;P&gt;********************************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.1.0 255.255.255.0 10.1.1.0&lt;/P&gt;&lt;P&gt;255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 120 permit ip 192.168.1.0 255.255.255.0 10.1.1.0&lt;/P&gt;&lt;P&gt;255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set vpnset esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool ippool 10.1.1.11-10.1.1.21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup vpnclient address-pool ippool&lt;/P&gt;&lt;P&gt;vpngroup vpnclient idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup vpnclient dns-server 172.16.1.1&lt;/P&gt;&lt;P&gt;vpngroup vpnclient password cisco456&lt;/P&gt;&lt;P&gt;vpngroup vpnclient split-tunnel 120&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set vpnset&lt;/P&gt;&lt;P&gt;crypto map remote_vpn 20 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username cisco password cisco123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;crypto map remote_vpn client authentication LOCAL&lt;/P&gt;&lt;P&gt;crypto map remote_vpn client configuration address initiate&lt;/P&gt;&lt;P&gt;crypto map remote_vpn client configuration address respond&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the VPN Client, just simply install it by following the&lt;/P&gt;&lt;P&gt;instruction on screen, click "new":&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"connection entry" a name for your reference&lt;/P&gt;&lt;P&gt;"host" public ip of the pix 501&lt;/P&gt;&lt;P&gt;"name" vpnclient&lt;/P&gt;&lt;P&gt;"password" cisco456&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To initiate a tunnel, double click the entry you just created.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH, please rate it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2007 08:42:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-split-tunnelling/m-p/733147#M1001624</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-07-23T08:42:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco pix 501 split tunnelling</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-split-tunnelling/m-p/733148#M1001625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry its taken a couple of days to come back to you. I firstly tried just ticking the box in the pdm that allows split-tunneling. which allowed my vista pc's to access the vpn and the internet but not the xp ones! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way for anyone thinking about ticking that box in the pdm it then stops access to the pdm and you need to make any other changes by the command line. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone know why this is ? &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;I've tried the solution posted here and while the dns gets resolved the user still cannot access the internet while on the vpn. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll include my config in case its been a typo. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any more advice would be welcome. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks &lt;/P&gt;&lt;P&gt;Suzanne&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2007 14:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-split-tunnelling/m-p/733148#M1001625</guid>
      <dc:creator>techsitc10</dc:creator>
      <dc:date>2007-07-25T14:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco pix 501 split tunnelling</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-split-tunnelling/m-p/733149#M1001626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list splittunnel_acl permit ip localofficehosts 255.255.255.0 vpndhcppool 255.255.255.0&lt;/P&gt;&lt;P&gt;vpngroup group-name split-tunnel splittunnel_acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;your acl will be specific to your setup. as will the vpngroup groupname&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2007 16:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-split-tunnelling/m-p/733149#M1001626</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-07-25T16:44:41Z</dc:date>
    </item>
  </channel>
</rss>

