Configuring Split Tunnel Client VPN - Cisco Meraki
Configuring Split Tunnel Client VPN - Cisco Meraki
Sign in
Forgot Password
Sign in
Search
Home > Security and SD-WAN > Client VPN > Configuring Split Tunnel Client VPN
https://documentation.meraki.com/MX/Client_VPN/Configuring_Split_Tunnel_Client_VPN 1/6
5/7/2020 Configuring Split Tunnel Client VPN - Cisco Meraki
This article includes instructions for configuring split tunnel client VPN on Windows and Mac OS X. For standard Client VPN configuration on Windows and Mac OS X, please refer to our Client
VPN setup guide. The rest of this article assumes a VPN has already been setup in this manner.
Note: This configuration involves manually adding entries to a client's route table, and should only be followed by users with a thorough understanding of routing mechanisms.
https://documentation.meraki.com/MX/Client_VPN/Configuring_Split_Tunnel_Client_VPN 2/6
5/7/2020 Configuring Split Tunnel Client VPN - Cisco Meraki
4. Select Internet Protocol Version 4 (TCP/IPv4) and click Properties
5. Click Advanced
6. Deselect the box for "Use default gateway on remote network"
Next, add routes for the desired VPN subnets. This should be done with the VPN tunnel connected:
1. Open a command prompt (hold down the Windows key and press 'R')
2. Type 'ipconfig /all' and hit Enter (Note: The name of the VPN will not be displayed unless you are connected to the VPN)
3. Under the list of interfaces, find the Description for the VPN connection created earlier. This will be needed later.
https://documentation.meraki.com/MX/Client_VPN/Configuring_Split_Tunnel_Client_VPN 3/6
5/7/2020 Configuring Split Tunnel Client VPN - Cisco Meraki
4. Run the below command replacing the relevant information between the <> markings:
Note: "Destination subnet" refers to the local LAN subnet (in CIDR notation) on the appliance's site, not the Client VPN subnet specified in Dashboard.
Use the same command, replacing "add" with "delete" to remove the route.
https://documentation.meraki.com/MX/Client_VPN/Configuring_Split_Tunnel_Client_VPN 4/6
5/7/2020 Configuring Split Tunnel Client VPN - Cisco Meraki
4. As a superuser, enter the following command, replacing the relevant information between the <> markings:
Note: "Destination subnet" refers to the local LAN subnet on the appliance's site, not the Client VPN subnet specified in Dashboard.
route add -net <destination subnet> -netmask <subnet mask> -interface ppp0
To verify that the route was added take a look at the routing table, the new subnet should now have an entry. The route table can be accessed by typing "netstat -r":
The route table will have to be modified depending on what networks will be accessed over the Client VPN (e.g. more than one network behind the concentrator). The interface will also have to be
modified if there is more than one VPN configured on the client.
Verify Connectivity
Now that the route is added, a trace route can be performed to verify the direction of the traffic. All internet traffic should head out the normal interface and all VPN traffic should head to the PPP
interface.
Note: These steps will have to be entered each time the VPN is brought up, but they can be defined in a script to make the changes quickly when needed. The specific process for this will be highly
dependent on the operating system, tools available, and administrator preferences.
https://documentation.meraki.com/MX/Client_VPN/Configuring_Split_Tunnel_Client_VPN 5/6
5/7/2020 Configuring Split Tunnel Client VPN - Cisco Meraki
https://documentation.meraki.com/MX/Client_VPN/Configuring_Split_Tunnel_Client_VPN 6/6