Cisco ESW-540-48 Administration Guide - Page 167
Configuring Client Routes for Split Tunnel Mode, Configuring VPN, Configuring Client Routes
![]() |
UPC - 882658251351
View all Cisco ESW-540-48 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 167 highlights
Configuring VPN Configuring SSL VPN for Browser-Based Remote Access 7 • Secondary DNS Server (Optional): Enter the IP address of the secondary DNS Server for this client. • Client Address Range Begin: Enter the first IP address that will be assigned to SSL VPN clients. • Client Address Range End: Enter the last IP address that will be assigned to SSL VPN clients. NOTE Configure an IP address range that does not directly overlap with any of addresses on your local network. For example, the default range is 192.168.251.1 to 192.168.251.254. STEP 3 Click Apply to save your settings. NOTE Next steps: If you enable Split Tunnel Support, you also will need to configure SSL VPN Client Routes. After you complete this procedure, see Configuring Client Routes for Split Tunnel Mode, page 167. Configuring Client Routes for Split Tunnel Mode If Full Tunnel support is disabled on the SSL VPN Client page, then you must configure client routes for Split Tunnel Mode. The Configured Client Routes entries are added by the SSL VPN Client such that only traffic to these destination addresses is redirected through the SSL VPN tunnels, and all other traffic is redirected using the hosts (SSL VPN Clients) native network interface. For example if the SSL VPN Client attempts to access this device's LAN network then in Split Tunnel mode, the user should add the LAN subnet as the Destination Network using this page. NOTE You can configure client routes only if Split Tunnel support is enabled on the SSL VPN Client page. See Configuring the SSL VPN Client, page 166. Cisco SA500 Series Security Appliances Administration Guide 167
![](/manual_guide/products/cisco-sa520k9-administration-guide-2168c30/167.png)