You can try a deny line as the first line in the ACL - though we typically don't recommend this. There is no 'split tunneling' with L2L, as your crypto ACL controls what you are sending.
You could also just be specific in the ACL for the networks you need - instead of putting 'any', put just the networks that need to be accessed and exclude the ones (like the one you don't want encrypted) from that ACL. This is usually what's done with L2L tunnels.
access-list tunnel-acl extended permit ip 10.0.1.0 255.255.255.0 192.168.1.0 255.255.255.0
access-list tunnel-acl extended permit ip 10.0.1.0 255.255.255.0 220.127.116.11 255.255.255.0
And this way you only encrypt the traffic that you want to encrypt, instead of all traffic.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...