- Mar 20, 2001
- 1,065
- 0
- 76
I'm looking to bypass the restrictions enforced by the Cisco VPN client (no local LAN access) in Windows. I don't think I can connect to the VPN using PPTP, I believe it has to be IPSec like the Cisco client uses.
I'm just wondering what is involved in mimicking the Cisco client (decrypting group password, etc.) from someone who knows how to do it. Google searches aren't turning up useful info.
I'm looking to bypass the restrictions enforced by the Cisco VPN client (no local LAN access) in Windows. I don't think I can connect to the VPN using PPTP, I believe it has to be IPSec like the Cisco client uses.
I'm just wondering what is involved in mimicking the Cisco client (decrypting group password, etc.) from someone who knows how to do it. Google searches aren't turning up useful info.
I'm looking to bypass the restrictions enforced by the Cisco VPN client (no local LAN access) in Windows.
And open the company network to any bugs/worms you may have? Don't do it. Nobody worth an ounce of security would allow split-tunneling (what you described).
Emulex said:heh i read his message as he didn't want to pay for the cisco vpn client. my bad.
I never bought into that aspect of it. All disallowing split-tunneling does is slow down my job because you're forcing me to browse and everything through the tunnel and your connection instead of my own. If I've got a bug/worm on my PC then my VPN connection to your network already opens you up to propagation.
Not necessarily true, because the corporate network probably has security at the edge of the network that can detect malware that a home network couldn't.
If the border will block it anyway why bother not allowing split-tunneling?
Because it's better to have 3 fences than one.
This best practice didn't come out of thin air. Its a response to known cases.
Because it's better to have 3 fences than one.
This best practice didn't come out of thin air. Its a response to known cases.
Can you cite one or two of those known cases?
MSblaster and nimda were the big ones that forced VPNs to consider the source untrusted until verfied and part of the countermeasures were no split tunneling, enforcing company personal firewall policies and anti-virus were correct before letting clients in.
If I remember correctly, both of those propagated on their own so if I was already infected and I connect to your VPN then it's going to attempt to infect servers on your network regardless of whether I have Internet connectivity out my connection or yours.
Then there's the aspect of bots and remote control. If you have split tunneling an intruder could use your machine to get into the internal network. There is just no sound reason to allow a 100s/10s of thousands of little gateways to the internet to attach to your network.
Then there's the aspect of bots and remote control. If you have split tunneling an intruder could use your machine to get into the internal network. There is just no sound reason to allow a 100s/10s of thousands of little gateways to the internet to attach to your network.
Thanks Nothinman and others that have made the point that this is just security theater. There is *no* credible threat that is protected against by disallowing split tunneling. Anything that could exploit a VPN connection by bridging a connection on a peer computer that's connected to that VPN with split tunneling enabled, would have already infected that peer computer. It's a sham. Sorry to be so harsh.
m1ldslide1 said:A network / security admin has to remember that they have all kinds of users with varying degrees of security consciousness. While some power users such as yourself may be diligent in patching and avoiding ukranian pr0n sites, many other users with access are not. You must always be on the watch for the lowest common denominator... I'm speaking from experience.
Frankly that just sounds like hand-waving. I understand the ideas behind defense in depth, security in layers, etc but if the PC has been compromised you shouldn't let it on the VPN at all. Or better yet, you shouldn't be giving users VPN access. Instead they should be coming in via a tightly controlled, known good system like TS, Citrix, etc with 2 factor authentication.