I'm hoping to receive some assistance with an issue I'm currently experiencing. It is related to a non-split VPN setup, the requirement is that VPN clients will be able to access a remote network and the internet via the firewall, in my case a ASA 5520, hence the public IP address for the vpn clients will be one assigned to our network by the ISP and no the vpn user's internet service public IP. I have followed the steps on this article but it is not working for me,
I run clear xlate and clear local after the changes with no luck. Once connected I am unable to access the internet and the remote network from the vpn client. The secured routes that are shown under statistics in the vpn client are 0.0.0.0 0.0.0.0
I also tried the split VPN set up and that works fine. When connected I am able to reach the remote network and internet without a problem.
I noticed that under the non-split vpn set up, the VPN clients get assigned an IP and a gateway from the vpn local pool, which is not the case on the split-VPN setup, where the VPN clients get assigned only an IP and not a gateway.
The firewall as mentioned is an ASA 5520, Cisco Adaptive Security Appliance Software Version 8.0(3), Device Manager Version 6.0(3)
See attached the config related to the non-split vpn set up.