• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1023
  • Last Modified:

Aventail SSL VPN vs. Cisco 3000 IPSec/WebVPN

Our company has been doing extensive research into VPN technology.  We currently connect employees into our network using dialup, so are about to proceed with broadband access via VPN.  We have no requirement as yet for site-to-site connectivity via the Internet.  

After some digging, we concluded that an SSL VPN would be the easiest, most cost-effective option, and also has the added benefit of allowing kiosk-based access (which greatly impressed management).  We trialed Aventail's EX-1500 and decided it was a good thing - it allowed browser-based access to any Web-enabled application, allowed most client/server applications to be accessed via a Java port forwarding applet (no client on the desktop), and also had an SSL-based Windows client for "power" users.  We loved the idea that we wouldn't have to go with an IPSec client for our "power" users, because we feared the issues associated with IPSec clients like support for IPSec tunnels/NAT etc from behind firewalls in hotels and other remote environmnents - pluss, we didn't want to have to maintain all those network configuration settings on a client-based piece of software.

Having said that, Cisco have now gone and released an IPSec/SSL blended VPN offering, which allows remote access to Web-enabled and most TCP client/server applications without any client on the user's desktop (via the SSL VPN half of the concentrator), and "power" users still need an IPSec client on their desktop.  It gives us the flexibility of remote access from anywhere with any device to to most things, however does have the downside of needing an IPSec client to be deployed and managed for "power" users.

I want to be sure that I am not being swayed by the marketing hype surrounding SSL VPNs - their existence is based upon hilighting the perceived "issues" with IPSec-based clients on the desktop.  My questions are:
1). Does anyone have any REAL experience with the Cisco 3000 series WebVPN features - do they work, are they robust, and how do they compare to Aventail's offering?  
2). Are the issues with NAT and firewall support at remote locations (e.g. hotels) for IPSec REAL or are they just theoretical possibilities that SSL VPN vendors are using to market their products?
3). Finally, are IPSec clients really that complex to manage?  What if a network configuration changes - do all clients have to be updated?
  • 2
2 Solutions
who is Aventail ?
I haven't explored the WebVPN side, but I've used the IPSEC side of the 3000 line, with very few problems.  The client does UDP encapsulation to get around most NAT issues that can interfere with VPN; I'd expect the web side to cover any that remain.  (For instance, it's not clear to me that UDP encapsulation can always cope with two VPN clients behind the same NAT device simultaneously, and some firewalls don't pass GRE, etc protocols.  Having a web/SSL fallback sounds like a great idea.)

As I recall, the primary client config was the FQDN/IP of the 3000 outside interface.  No sweat.

#1)  no expierence with Aventail, so I can't compare.  However, Cisco's offerings are usually pretty robust in flexibilty and features.  

#2) They are real. IPSecy no likey nattie

#3) One side of the VPN must be static.  IF not, you can use a dyndns.org type of a service.  Once its setup, it runs.  There isn't much to manage.

  I would recomend looking into Sonic wall.  I'm a huge Cisco fan but thier VPN's are just pain in the neck complex to administer.  Sonicwall is much more gui and easier to configure and offers ssl.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Cloud Class® Course: Certified Penetration Testing

This CPTE Certified Penetration Testing Engineer course covers everything you need to know about becoming a Certified Penetration Testing Engineer. Career Path: Professional roles include Ethical Hackers, Security Consultants, System Administrators, and Chief Security Officers.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now