<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Pix 6.2 Split Tunneling Problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-pix-6-2-split-tunneling-problem/m-p/1373904#M723415</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you check the route details on your vpn client? What is the secure route pushed? To check this go ahead and once connected right click on the VPN lock icon and click on details. Please post it here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Feb 2010 18:36:19 GMT</pubDate>
    <dc:creator>Ivan Martinon</dc:creator>
    <dc:date>2010-02-04T18:36:19Z</dc:date>
    <item>
      <title>Cisco Pix 6.2 Split Tunneling Problem</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-6-2-split-tunneling-problem/m-p/1373903#M723393</link>
      <description>&lt;P&gt;I am trying to setup a second vpngroup on a pix 6.2 (I know&lt;/P&gt;&lt;P&gt;it is old but can't upgrade it yet) and am having a problem. I can connect to the new vpngroup and it works when there is not split tunnel configured but&lt;/P&gt;&lt;P&gt;when I add the split tunnel command it will not route and I see the 'bypassed' packets count going up.&amp;nbsp; Not sure what is causing this, but any help you can give would be appreciated.&amp;nbsp; Below is my config for the firewall.&amp;nbsp; let me know if you see anything that could be causign the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 90 permit ip 192.168.0.0 255.255.255.0 192.168.6.0 255.255.255.0&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;BR /&gt;aaa-server RADIUS protocol radius &lt;BR /&gt;aaa-server LOCAL protocol local &lt;BR /&gt;aaa-server auth-servers protocol radius &lt;BR /&gt;aaa-server auth-servers (inside) host 192.168.0.12 ******** timeout 60&lt;BR /&gt;ip local pool remote-access 192.168.6.1-192.168.6.254&lt;BR /&gt;crypto ipsec transform-set xform-set esp-des esp-md5-hmac &lt;BR /&gt;crypto dynamic-map dynmap 10 set transform-set xform-set&lt;BR /&gt;crypto map test2 10 ipsec-isakmp dynamic dynmap&lt;BR /&gt;crypto map test2 client configuration address initiate&lt;BR /&gt;crypto map test2 client authentication auth-servers&lt;BR /&gt;crypto map test2 interface outside&lt;BR /&gt;isakmp enable outside&lt;BR /&gt;isakmp client configuration address-pool local remote-access outside&lt;BR /&gt;isakmp policy 10 authentication pre-share&lt;BR /&gt;isakmp policy 10 encryption des&lt;BR /&gt;isakmp policy 10 hash md5&lt;BR /&gt;isakmp policy 10 group 2&lt;BR /&gt;isakmp policy 10 lifetime 86400&lt;BR /&gt;isakmp policy 30 authentication pre-share&lt;BR /&gt;isakmp policy 30 encryption des&lt;BR /&gt;isakmp policy 30 hash sha&lt;BR /&gt;isakmp policy 30 group 2&lt;BR /&gt;isakmp policy 30 lifetime 86400&lt;BR /&gt;vpngroup default address-pool remote-access&lt;BR /&gt;vpngroup default dns-server 192.168.0.12&lt;BR /&gt;vpngroup default wins-server 192.168.0.12&lt;BR /&gt;vpngroup default default-domain xxx.local&lt;BR /&gt;vpngroup default idle-time 1800&lt;BR /&gt;vpngroup default password ********&lt;BR /&gt;vpngroup SplitTunnel address-pool remote-access&lt;BR /&gt;vpngroup SplitTunnel dns-server 192.168.0.12&lt;BR /&gt;vpngroup SplitTunnel wins-server 192.168.0.12&lt;BR /&gt;vpngroup SplitTunnel default-domain xxx.local&lt;BR /&gt;vpngroup SplitTunnel split-tunnel 90&lt;BR /&gt;vpngroup SplitTunnel split-dns xxx&lt;BR /&gt;vpngroup SplitTunnel idle-time 1800&lt;BR /&gt;vpngroup SplitTunnel password ********&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-6-2-split-tunneling-problem/m-p/1373903#M723393</guid>
      <dc:creator>nickehunt</dc:creator>
      <dc:date>2019-03-11T17:03:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 6.2 Split Tunneling Problem</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-6-2-split-tunneling-problem/m-p/1373904#M723415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you check the route details on your vpn client? What is the secure route pushed? To check this go ahead and once connected right click on the VPN lock icon and click on details. Please post it here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Feb 2010 18:36:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-6-2-split-tunneling-problem/m-p/1373904#M723415</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2010-02-04T18:36:19Z</dc:date>
    </item>
  </channel>
</rss>

