Michael

Split tunnelling itself is not used for route injection, it's purpose  
is to define the networks/traffic that will be encrypted across the  
VPN. If you want to insert a route for the vpn traffic into the  
devices table you would use RRI - reverse route injection.

I am not fully familiar with lab 4 but this can be done using the  
reverse-route command in the crypto map / profile for instance. This  
effectively puts a static route into the table which you can  
redistribute to other devices via a dynamic routing protocol and the  
redistribute static command.

Check out the reverse-route command for the relevant device cmd  
reference.

Hth
Stu

Sent from my iPhone

On 16 Jan 2010, at 07:53, Michael Davis <[email protected]>  
wrote:

> Hello all – on lab 4a Part 2, task 4.10 – we assign a split  
> tunnel value for the R8 client to receive a route to 10.1.1.0.  This 
>  is fine.  I can ping my ACS server from R8 using the auto created l 
> oop interface for the ipsec client as the source, but how would I pu 
> t the split tunnel route into the routing table on R8 so I do not ha 
> ve to ping the ACS server by source – So when the client connects fr 
> om R8  the split tunnel route enters the routing table though the ne 
> wly created loop interface?
>
> Is it a command I would put into the ASA1 group policy perhaps?
>
> _______________________________________________
> For more information regarding industry leading CCIE Lab training,  
> please visit www.ipexpert.com
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to