I'm looking for a way to protect my Mac OS 10.8 routing table. After connecting to my employer's network using the Cisco AnyConnect Secure Mobility Client, a bunch of new routes are installed into my routing table, most of which I do not care for. For example:
192.168.1 link#8 UCS 0 0 utun0
Which changes all local LAN traffic to use the new tunnel interface. This is trivially overridden using the following:
route change 192.168.1.0/24 192.168.1.254
Which changes the route to:
192.168.1.0 link#5 UCS 1 0 en1
But as expected, the folks at Cisco are fairly clever - they've designed the application to periodically check and correct any changes to my routing table. Here's what happens shortly after I modify the routing table, from my Console:
acvpnagent: A routing table change notification has been received. Starting automatic correction of the routing table.
acvpnagent: Function: executeRouteCmd File: ../../vpn/AgentUtilities/Routing/RouteTableMac.cpp
The function continues to delete my routes and add the original routes
acvpnagent: Automatic correction of the routing table has been successful.
So at this point, I would like to find a way to prevent acvpnagent from calling the route command after the initial tunnel is build - or to install routes that it cannot see/change, if possible.