I don't think thats the answer I'm looking for it may be if so your way out of my league!! Heres what I have: windows 2003 server with VPN service and a application that holds client data on the server so everyone must log in to server to process loans and such (mortgage company), 8 computers on the LAN all including server with non internet IP's (10.1.1etc) the gateway which performs the NAT forthis network is a cisco router with a static IP on the internet. The router forwards certain ports to the server (so remote users can log in and work) in default config if you are connected to internet and you establish a VPN connection to server you get a error message like local area connection not connected, or something to that effect and you cannot access the internet but you can access server. Disconnect from VPN and bam internet is back. The server assigns IP's to the VPN clients from within the pool that the cisco router should recognize as non internet IP's and translate them but thats not happening, make sense?? I'm not terribly familer with cisco or NAT so I may not be describing this in a efficient manner.....
Well, actually it is doing exactly what I mentioned from this recent post. The VPN client is cutting off all traffic besides the VPN tunnel as to not create a bridge, which of course would be a hole. This is configured correctly. You now need to make the VPN server give the correct IP scheme to the external workstations upon connect. You will need to push the interal default internet gateway/router address to the clients once the connection is made. What it seems like is happenning is you are only getting partion IP information when connecting the VPN takes over the stack. Do me a favor. On a client machine that is external, give me an ipconfig /all before the VPN connection, then give me one after. Pipe it to a text file by issuing both times:
ipconfig /all >> %SYSTEMDRIVE%\ip.txt
route print >> %SYSTEMDRIVE%\route.txt
Send me the ip.txt and the route.txt file
Anyway, you may be stuck setting up an autoconfiguration script within IE to allow for this. It is hard to tell every setting and every entity on a network via text communication like this.
As a side note, if you are using mortgage origination software most pipe it through Citrix Presentation Server which makes it much easier and no VPN is needed due to the SSL 443 tunnel. This works well with Calix Point, Genesis 2000, Contour, and of course Encompass. Genesis 2000 is at the end of it's life as one of my clients were notified last month so they are either going with Contour or Encompass. My vote would be Encompass. I am just starting to look into their newer products now, and from what I heard they have a built in web interface that allows for native webserver connections over SSL 443.
Let me know if any of these ideas ring a bell or we'll ust continue trying to nip away at it. Like I saiid without me on site, it is sometimes hard to decypher what is going on and what is needed. But we'll keep trying. The main thing we are trying to accomplish is that the VPN server, once authenticated creates a vitrual adapter and gives the gate way that the people use interally to get to the internet. But like I said, if they are using a internally, or a firewall you may have to configure an automatic configuration script for the external users to utilize. We'll get it.