By default, all traffic from the client goes through the tunnel, this is normal behavior. In order for users to have access to the Internet while connected via vpn, you will need to enable split-tulleling on the device that the vpn clients are connecting to.
Well how come the other VPN client connections I have don't have split-tunneling enabled and they are still able to surf the web?
I tried enabling split-tunneling and when I created the VPN tunnel, I could continue to surf the web, but I wasn't able to connect to anything on the inside network. Would the problem be on the access-list or what? How exactly do I do the split tunneling?
I would imagine the other client connections are using your LANs default gateway back out to the internet. Instead of allowing split-tunneling(a security risk I might add) why not try to have the problematic clients use the LAN default gateway?
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...