For your VPN client users to simultaneously access your internal network and the internet you'll need to enable split-tunnelling for the VPN client access.
A note of caution here with reference to enabling split-tunnelling, if your VPN client users are connected to your corporate network whilst having access to the unsecured network (internet) and if your VPN client user's machine gets compromised (Trojan's, worms etc) then you are also compromising your corporate network too!
I personally would not give VPN client users simultaneous access to the internet and the corporate network.
But if you decide that you want to give your users internet access whilst connected to your corporate network via the VPN client then take a read of the following document for configuration example:
However I shall try to elaborate the situation a bit:-
1. We assume that you are talking about Remote Access VPN and NOT Site-to-Site VPN.
2. If you want Remote Access VPN users to be able to access Internet also, then the recommended step would be to enable them to acccess the Internet via the main network rather than they themselves having a direct access.
If you still have queries, I shall request you to post a bit more of the details and configs about your present scenario.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...