There is a restriction with the number of entries in an ACL used for split tunnel. It is recommended not to use more than 50-60 ACE entries for satisfactory functionality. You are advised to implement the subnetting feature to cover a range of IP addresses.
ASA/PIX: Allow Split Tunneling for VPN Clients on the ASA Configuration Example
I am not sure I follow exactly what you want to do. Do you just want to set up split tunneling plain and simple, or do you want split VPN as well as restricting access to resources on your network?
Setting up split tunneling is basically done by defining the interesting traffic which is to be encrypted on a L2L setup. Here is a sample of how it would be set up on an ASA running version 8.3 or higher.
access-list cryptoACL extended permit ip 10.10.10.0 255.255.255.0 22.214.171.124 255.255.255.0
crypto ipsec ikev1 transform-set SET esp-aes esp-sha-hmac
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...