<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Default Gateway on VPN Client in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/default-gateway-on-vpn-client/m-p/667008#M1059282</link>
    <description>&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;I am running a Pix 515 with 6.3 code.  When the VPN Connection is established, the default gateway on the PC is the same as the IP Address on the PC.  The VPN Connection is made on the Internet Line in and the Internet Traffic, would obviously be on the same internet line, going out. First, is it possible to be able to establish internet connectivity while being VPN'd in, and if so, how.  Much Appreciated.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 09:18:42 GMT</pubDate>
    <dc:creator>rwamstutz</dc:creator>
    <dc:date>2020-02-21T09:18:42Z</dc:date>
    <item>
      <title>Default Gateway on VPN Client</title>
      <link>https://community.cisco.com/t5/network-security/default-gateway-on-vpn-client/m-p/667008#M1059282</link>
      <description>&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;I am running a Pix 515 with 6.3 code.  When the VPN Connection is established, the default gateway on the PC is the same as the IP Address on the PC.  The VPN Connection is made on the Internet Line in and the Internet Traffic, would obviously be on the same internet line, going out. First, is it possible to be able to establish internet connectivity while being VPN'd in, and if so, how.  Much Appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:18:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-gateway-on-vpn-client/m-p/667008#M1059282</guid>
      <dc:creator>rwamstutz</dc:creator>
      <dc:date>2020-02-21T09:18:42Z</dc:date>
    </item>
    <item>
      <title>Re: Default Gateway on VPN Client</title>
      <link>https://community.cisco.com/t5/network-security/default-gateway-on-vpn-client/m-p/667009#M1059288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can use the split tunnel feature where you can define which traffic (src/dest) to encrypt and what not to encrypt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, you need to define this via ACL, for example, encrypt only 10.1.1.0 accessing 10.1.100.0. Other than that, do not encrypt and should flow outside the tunnel:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list splittunnel permit ip 10.1.1.0 255.255.255.0 1.1.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More details/example on this is available at:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172787.html#wp1076294" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172787.html#wp1076294&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Nov 2006 03:06:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/default-gateway-on-vpn-client/m-p/667009#M1059288</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-11-16T03:06:34Z</dc:date>
    </item>
  </channel>
</rss>

