Solved

VPN issues

Posted on 2007-03-22
4
151 Views
Last Modified: 2012-05-05
We VPN into our main office.
We are not on their network and are completely separate from their network.  Nothing is in common with them.  Look at it as a completely separate entity.

In order to get into the main office's resources, is we have to VPN into them.
When we do that it wipes out our primary network connection, we cannot get into outlook, and cannot map network drives.
It seems, the VPN takes over the network.
We are using a single NIC card.

Any suggestions how the 2 can work together.

Thanks
0
Comment
Question by:autumn801
  • 3
4 Comments
 
LVL 77

Expert Comment

by:Rob Williams
ID: 18772152
How is your VPN established, or rather what VPN client are you using?
There is a security feature built into all VPN clients that blocks local connections, including local Internet access, to protect the office/remote network. Keeping in mind the possible security concerns, this can be modified to allow access to your local network at the same time as the VPN. It is called split-tunneling. The function is changed in different ways with different VPN's, some on the client and others on the router/server end. If you are using the Windows VPN client you can do so on the client/connecting PC.
Go to:
control panel | network connections | right click on the VPN/Virtual adapter and choose properties | Networking | TCP/IP -properties | Advanced | General | un-check  "Use default gateway on remote network"
0
 

Author Comment

by:autumn801
ID: 18772189
This done through Cisco Systems VPN Client Version 4.0.5

And main company gave us this client.
So then they have to change it.
0
 
LVL 77

Accepted Solution

by:
Rob Williams earned 50 total points
ID: 18772448
Yes the support staff for the Cisco would have to enable split-tunneling. There is no way to do it locally.
Very possible they will not do so as it exposes their network to any attacks that you may receive on your end.
0
 
LVL 77

Expert Comment

by:Rob Williams
ID: 18777356
Thanks autumn801.
Cheers !
--Rob
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

If you have done a reformat of your hard drive and proceeded to do a successful Windows XP installation, you may notice that a choice between two operating systems when you start up the machine. Here is how to get rid of this: Click Start Clic…
Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now