Michael, are you refering L2L VPN? if so there shouldn't be any other route statement needed to be configured in PIX as long you have default route in PIX configured and that the other side of tunnel is indeed reachable through your outside interface (internet). The rest as you said is taken care by acls and crypto maps etc..
Yes, your understanding is correct. If you have other static routes or dynamic routing protocols configured, then these will show up in the routing table along with the connected routes. But, for IPSEC, in most of the cases, it should follow the default route unless you do not have a default route and have specific routes pointing to the outside interface to reach the IPSEC Peer Address or terminating the IPSEC Tunnel on a DMZ Interface.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...