<VPNProfile>  
  <NativeProfile>  
<Servers>ca-vpn.centurionamerican.com</Servers>  
<NativeProtocolType>IKEv2</NativeProtocolType>  
<Authentication>  
  <MachineMethod>Certificate</MachineMethod>  
</Authentication>  
<RoutingPolicyType>SplitTunnel</RoutingPolicyType>  
 <!-- disable the addition of a class based route for the assigned IP address on the VPN interface -->
<DisableClassBasedDefaultRoute>true</DisableClassBasedDefaultRoute>  
  </NativeProfile> 
  <!-- use host routes(/32) to prevent routing conflicts Added 151/152.0 BrianO-->  
                  <Route>
                        <Address>192.168.20.0</Address>
                        <PrefixSize>24</PrefixSize>
                    </Route>
					<Route>
                        <Address>192.168.76.0</Address>
                        <PrefixSize>24</PrefixSize>
                    </Route>
					<Route>
                        <Address>192.168.10.0</Address>
                        <PrefixSize>24</PrefixSize>
                    </Route>
					<Route>
                        <Address>192.168.151.0</Address>
                        <PrefixSize>24</PrefixSize>
                    </Route>
					<Route>
                        <Address>192.168.152.0</Address>
                        <PrefixSize>24</PrefixSize>
                    </Route>					
<!-- need to specify always on = true --> 
  <AlwaysOn>true</AlwaysOn> 
<!-- new node to specify that this is a device tunnel --> 
 <DeviceTunnel>true</DeviceTunnel>
 <!-- Interface Suffix - BrianO --> 
 <DnsSuffix>dfwdevelopment.local</DnsSuffix>
<!--new node to register client IP address in DNS to enable manage out -->
<RegisterDNS>true</RegisterDNS>
<!--When trusted network detection is configured, the VPN client will evaluate the DNS suffix assigned to all physical (non-virtual or tunnel) adapters that are active. If any of them match the administrator-defined trusted network setting, the client is determined to be on the internal network and the VPN connection will not connect. If the DNS suffix is not present on any of these adapters, the client is determined to be outside the internal network and the VPN connection will establish automatically. BrianO -->
<TrustedNetworkDetection>dfwdevelopment.local</TrustedNetworkDetection>
<!--Interface DNS Info BrianO -->
<DomainNameInformation>
    <DomainName>.dfwdevelopment.local</DomainName>
</DomainNameInformation>
</VPNProfile>