Link to home
Start Free TrialLog in
Avatar of vijaikanagaraj
vijaikanagaraj

asked on

Automate VPN client software based on the defined network

Dears,

I'm running a Cisco VPN client 4.6 for Windows XP .I have configured remote access in the PIX firewall which is running 7.0(2) software version.

Basically we will invoke the VPN client software in our system  to establish the tunnel with our organization network.

But my requirement is the following,

Letz consider suppose the user takes their laptop to home and plug into the ISP netwrok, I need to automate the VPN client software on my laptop whenever a traffic gets intiated through Dial-up,ADSL and Wi-FI based on the network list.

To give an overview, once the VPN client finds the foreign address in the network card(say Public IP address other than organization Internal LAN IP), It should not allow the users to access the internet. It should have control on the adapters so that no traffic will be initiated out unless the user gets authenticated by VPN client.

At the same time if the interface receives the organization LAN IP address ,the VPN client utility should not come-up for authentication,so that the users can connect to their office network.

Is it a way to integrate VPN client utility with all the adapters atleast with LAN NIC .

Are there any 3rd party VPN client product will support this feature with PIX firewall?

Kindly advice me how to go about.

Your valuable feedback appreciated..


rgds
sai
ASKER CERTIFIED SOLUTION
Avatar of Member_2_2473503
Member_2_2473503
Flag of Philippines image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of Les Moore
Use the auto initiation feature of the Cisco VPN client:
http://www.cisco.com/univercd/cc/td/doc/product/vpn/client/4_6/admin/vcach4.htm

The ports mentioned above are relitive to your setup, our vpn we use UDP port 20000 for the connections, we allow DHCP broadcasts. The cisco vpn firewall is only active when the VPN client software is connected to a VPN end point, so you could use it's own firewall to set these rules up once connected... however to keep the users from connecting to other resources like wifi, or a local lan... that may be a  little tougher. You can setup a 3rd party firewall program to only allow access to the public ip's of your VPN's and their ports, as well as allowing traffic to a certain private subnet once connected. You can use windows IPSec filters, built in since win2k, or a 3rd party like zonealarm. ZoneAlarm pro can have a password assigned to it so that only those who have the pass can allow cetain actions, if the pass isn't known, then all one can do is select "deny" or ignore. I'd take away admin priv's from the users accounts when ever possible also. ZoneAlarm can't be safely and properly uninstalled without the password, but it could be by-passed if they users have admin rights. Firewall's are stateful, so if your PC sends out a DHCP broadcast, the firewall should be smart enough to allow the answer back through, but not all firewalls are smart enough, especially with something like DHCP as it's a broadcast, and is a sessionless protocol.

-rich
Symantec's client firewall is also stateful, and has password protected uninstall.  You can also lock it down to the point where users (admins included) can not change any settings or disabel the firewall.  
Avatar of vijaikanagaraj
vijaikanagaraj

ASKER

Hi folks ,

thnaks for ur response.But  as per ejbers comment ,it address my problem somehow.But what would it happen if I connect my same laptop to my internal network.will it allow the normal traffic .

Since my requirement is the VPN client should act based on the IP address received by the interface.

If it is ISP address then it should block the users from accessing internet and only they should pass through VPN client,in the same way if it is internal IP address then the user will access the LAN as usual.

We have tried the Auto-initiation feature which was not the solution for this solution.It wirks good only within LANs if you move from one LAn to other LAN.

To add more on this I have cisco security Agent software also installed ,will this can achieve the firewall functionality in terms of restricting the ports.

rgds
sai

Symantec's client firewall works with locations and you can set rules based on location.  You can set it up so that when the laptop has an IP from your network it has internet connectivity and anything else you allow.  You then set the default location (anything that is not defined as another location) to block everything except connectivity to your domain.

I'm not sure about the CISCO security agent as I've never used it myself.