Aventail SSL VPN vs. Cisco 3000 IPSec/WebVPN

Posted on 2004-03-22
Last Modified: 2012-08-14
Our company has been doing extensive research into VPN technology.  We currently connect employees into our network using dialup, so are about to proceed with broadband access via VPN.  We have no requirement as yet for site-to-site connectivity via the Internet.  

After some digging, we concluded that an SSL VPN would be the easiest, most cost-effective option, and also has the added benefit of allowing kiosk-based access (which greatly impressed management).  We trialed Aventail's EX-1500 and decided it was a good thing - it allowed browser-based access to any Web-enabled application, allowed most client/server applications to be accessed via a Java port forwarding applet (no client on the desktop), and also had an SSL-based Windows client for "power" users.  We loved the idea that we wouldn't have to go with an IPSec client for our "power" users, because we feared the issues associated with IPSec clients like support for IPSec tunnels/NAT etc from behind firewalls in hotels and other remote environmnents - pluss, we didn't want to have to maintain all those network configuration settings on a client-based piece of software.

Having said that, Cisco have now gone and released an IPSec/SSL blended VPN offering, which allows remote access to Web-enabled and most TCP client/server applications without any client on the user's desktop (via the SSL VPN half of the concentrator), and "power" users still need an IPSec client on their desktop.  It gives us the flexibility of remote access from anywhere with any device to to most things, however does have the downside of needing an IPSec client to be deployed and managed for "power" users.

I want to be sure that I am not being swayed by the marketing hype surrounding SSL VPNs - their existence is based upon hilighting the perceived "issues" with IPSec-based clients on the desktop.  My questions are:
1). Does anyone have any REAL experience with the Cisco 3000 series WebVPN features - do they work, are they robust, and how do they compare to Aventail's offering?  
2). Are the issues with NAT and firewall support at remote locations (e.g. hotels) for IPSec REAL or are they just theoretical possibilities that SSL VPN vendors are using to market their products?
3). Finally, are IPSec clients really that complex to manage?  What if a network configuration changes - do all clients have to be updated?
Question by:freemchr
  • 2

Expert Comment

ID: 10658368
who is Aventail ?
LVL 11

Accepted Solution

PennGwyn earned 125 total points
ID: 10660913
I haven't explored the WebVPN side, but I've used the IPSEC side of the 3000 line, with very few problems.  The client does UDP encapsulation to get around most NAT issues that can interfere with VPN; I'd expect the web side to cover any that remain.  (For instance, it's not clear to me that UDP encapsulation can always cope with two VPN clients behind the same NAT device simultaneously, and some firewalls don't pass GRE, etc protocols.  Having a web/SSL fallback sounds like a great idea.)

As I recall, the primary client config was the FQDN/IP of the 3000 outside interface.  No sweat.


Assisted Solution

ministry92 earned 125 total points
ID: 10667517
#1)  no expierence with Aventail, so I can't compare.  However, Cisco's offerings are usually pretty robust in flexibilty and features.  

#2) They are real. IPSecy no likey nattie

#3) One side of the VPN must be static.  IF not, you can use a type of a service.  Once its setup, it runs.  There isn't much to manage.

  I would recomend looking into Sonic wall.  I'm a huge Cisco fan but thier VPN's are just pain in the neck complex to administer.  Sonicwall is much more gui and easier to configure and offers ssl.

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

Join Greg Farro and Ethan Banks from Packet Pushers ( and Greg Ross from Paessler ( for a discussion about smart network …
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now