08-12-2021 01:51 PM - edited 08-12-2021 02:00 PM
Hi there,
When I am connected (via Anyconnect 4.9) to our SSL VPN on our RV340, I cannot reach my local network printer. To remedy this, I enabled split tunneling and allowed access to my local LAN (192.168.1.0). With this set up, I can ping my own computer's local IP address (192.168.1.150), and my local gateway (192.168.1.254) *only*. Any other IP address including my printer (192.168.1.225) doesn't work. I did a tracert, and for my gateway and PC, it goes straight to their 192.168.1.x addresses. But when I ping my printer, it goes out to my VPN IP (192.168.5.1) and then breaks down somewhere on the internet after a few hops.
What am I missing here? Is there a way to get access to my full local LAN when connected to the VPN?
08-12-2021 01:57 PM
split-tunnel should work, (what IP you get from VPN ?) show route will help us.
08-12-2021 02:01 PM
192.168.5.23 is my VPN IP.
08-12-2021 02:54 PM
can you post route print from your PC when you connect to VPN?
08-12-2021 03:14 PM
Sure and many thanks for helping me. Much appreciated. I can reach the printer if I add a route to my PC to force it through my local gateway, but yeah, I'd rather not have to do that. I don't get why it lets me ping the gateway or myself but not anything else.
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.254 192.168.1.175 281
8.8.8.8 255.255.255.255 192.168.1.254 192.168.1.175 26
75.157.xxx.xx 255.255.255.255 192.168.1.254 192.168.1.175 26
127.0.0.0 255.0.0.0 On-link 127.0.0.1 331
127.0.0.1 255.255.255.255 On-link 127.0.0.1 331
127.255.255.255 255.255.255.255 On-link 127.0.0.1 331
192.168.0.0 255.255.255.0 On-link 192.168.5.27 2
192.168.0.255 255.255.255.255 On-link 192.168.5.27 257
192.168.1.0 255.255.255.0 On-link 192.168.1.175 281
192.168.1.0 255.255.255.0 On-link 192.168.5.27 2
192.168.1.175 255.255.255.255 On-link 192.168.1.175 281
192.168.1.254 255.255.255.255 On-link 192.168.1.175 26
192.168.1.255 255.255.255.255 On-link 192.168.1.175 281
192.168.1.255 255.255.255.255 On-link 192.168.5.27 257
192.168.5.27 255.255.255.255 On-link 192.168.5.27 257
192.168.20.1 255.255.255.255 On-link 192.168.5.27 2
192.168.20.200 255.255.255.255 On-link 192.168.5.27 2
224.0.0.0 240.0.0.0 On-link 127.0.0.1 331
224.0.0.0 240.0.0.0 On-link 192.168.1.175 281
224.0.0.0 240.0.0.0 On-link 192.168.5.27 10000
255.255.255.255 255.255.255.255 On-link 127.0.0.1 331
255.255.255.255 255.255.255.255 On-link 192.168.1.175 281
255.255.255.255 255.255.255.255 On-link 192.168.5.27 10000
08-13-2021 04:23 AM
May be wrong here - but your route shows this :
192.168.1.0 255.255.255.0 On-link 192.168.5.27 2 (Lower metric)
08-12-2021 03:31 PM
Hello,
can you post a couple of screenshots showing how you set up the split tunneling ? Make sure it looks like the setup described in the link below...
08-15-2021 06:52 PM
08-15-2021 07:27 PM
Many thanks! So in your example you have it set to exclude traffic.. the Cisco example had it including. That may well be where I went wrong!!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide