I have a Pix 515 and cannot for the life of me get split-tunneling to work for our employees that use the VPN client. Here are the relevant parts of my Pix config - any help would be greatly appreciated.
PIX Version 6.3(3)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security60
access-list 90 permit ip 172.16.0.0 255.255.0.0 192.168.1.0 255.255.255.0
ip address outside 208.5.xxx.xxx 255.255.255.224
ip address inside 172.16.xxx.xxx 255.255.0.0
ip address dmz 10.1.1.xxx 255.255.255.0
ip local pool remote_user 192.168.1.1-192.168.1.254
nat (inside) 0 access-list 90
nat (inside) 1 172.16.0.0 255.255.0.0 0 0
nat (dmz) 1 10.1.1.0 255.255.255.0 0 0
sysopt connection permit-ipsec
crypto ipsec transform-set strong esp-des esp-md5-hmac
crypto dynamic-map dyn_map 20 set transform-set strong
crypto map my_map 20 ipsec-isakmp dynamic dyn_map
crypto map my_map interface outside
isakmp enable outside
isakmp key ********** address 0.0.0.0 netmask 0.0.0.0
isakmp identity address
isakmp client configuration address-pool local remote_user outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 14400
vpngroup remote_user address-pool remote_user
vpngroup remote_user dns-server 172.16.xxx.xxx
vpngroup remote_user wins-server 172.16.xxx.xxx
vpngroup remote_user default-domain mycompany.com
vpngroup remote_user split-tunnel 90
vpngroup remote_user idle-time 1800
vpngroup remote_user password **********
PIX Version 6.3(3)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security60
access-list 90 permit ip 172.16.0.0 255.255.0.0 192.168.1.0 255.255.255.0
ip address outside 208.5.xxx.xxx 255.255.255.224
ip address inside 172.16.xxx.xxx 255.255.0.0
ip address dmz 10.1.1.xxx 255.255.255.0
ip local pool remote_user 192.168.1.1-192.168.1.254
nat (inside) 0 access-list 90
nat (inside) 1 172.16.0.0 255.255.0.0 0 0
nat (dmz) 1 10.1.1.0 255.255.255.0 0 0
sysopt connection permit-ipsec
crypto ipsec transform-set strong esp-des esp-md5-hmac
crypto dynamic-map dyn_map 20 set transform-set strong
crypto map my_map 20 ipsec-isakmp dynamic dyn_map
crypto map my_map interface outside
isakmp enable outside
isakmp key ********** address 0.0.0.0 netmask 0.0.0.0
isakmp identity address
isakmp client configuration address-pool local remote_user outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 14400
vpngroup remote_user address-pool remote_user
vpngroup remote_user dns-server 172.16.xxx.xxx
vpngroup remote_user wins-server 172.16.xxx.xxx
vpngroup remote_user default-domain mycompany.com
vpngroup remote_user split-tunnel 90
vpngroup remote_user idle-time 1800
vpngroup remote_user password **********