Lucky guess: Is it possible you don't receive the same routes over the
VPN than you have when you are in your office? (e.g. does your computer
know where to send packets for the 10.57 network when you're connected
to the VPN?)
You can check that out with 'route -n' in a terminal.
--
Gabriel Filion
VPN software tends to jam itself into the network stack in odd places;
it might be that your IPsec connection has inserted itself before
sshuttle (which on MacOS uses ipfw, itself an odd place to put a
network route). If so, you might be a bit out of luck for getting
sshuttle to take precedence.
What I don't quite understand is why, if you're using IPsec anyway,
you need sshuttle. Aren't you already safely into your internal
network anyway? I can imagine using sshuttle to *replace* a Cisco VPN
- man, that thing is awful - but I don't know why you'd want to use
both.
That said, one option I could think of would be to manually narrow the
set of routes in your Cisco VPN configuration. That is, tell it to
route *only* the IP of your sshuttle gateway. Then Cisco VPN will get
first crack at each outgoing connection, but it'll let it pass unless
it's exactly the right IP. sshuttle will then get a chance to look at
it.
Please let us know if this helps.
Thanks,
Avery
Thanks! Hopefully your message will help future Cisco VPN users.
What did your routing table look like before that? Did you have any
route at all that still pointed to the desired destination?
Thanks,
Avery