• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 493
  • Last Modified:

Split Tunneling on Cisco ASA VPN Behind Sonic Wall

Hello all,
     I will be helping a friend tomorrow try to figure something out and wanted to see who could help out. Basically, they have a function Cisco ASA VPN behind a sonic wall Firewall. The Cisco was left in place because there were 3-5 users who still use it regularly and because they need it for their VoIP licensing. I am not sure how the two are connected at this point (port forwarding or proxy arp or what). But here are some basic questions we need some advice on:
1) Is there anything inherently insecure about enabling Split-Tunneling in this situation? Why or Why not?
2) Can Split Tunneling be setup on a per user basis, or can it only be enabled for everyone who uses the VPN?
3) How does one configure Split Tunneling using the CLI?
4) And Finally, is there any reason, besides licensing costs, that we shouldn't just stop using the ASA for VPN and switch to just using the Sonic Wall?


Thanks!
0
JesusFreak42
Asked:
JesusFreak42
  • 3
  • 2
1 Solution
 
Alan Huseyin KayahanCommented:
1)Your existing setup does not make split-tunnel more insecure than a split-tunneling in a traditional setup. In a traditional setup, split-tunneling is safe and widely used.
2)You can not setup split-tunnel per user however you can setup a split-tunnel per tunnel-group. You can create multiple tunnel-groups and associate users with tunnel groups.
A better option would be to implement DACL per user group where you need to integrate ASA with a TACACS or applicable RADIUS server.
3) Following is a step-by-step guide written by Pete Long.
http://www.petenetlive.com/KB/Article/0000066.htm
10.0.0.0/24 in the ACL is the network that you want the VPN clients to be able to access. You can add multiple entries into this ACL to provide connectivity to multiple networks inside.
4)No other reasons. Look for performance stats for both models, see which one can utilize more packets per second, compare what is the goodput through the device when all services are enabled, if the unit has the types of interfaces you need etc. and make your decision on either ASA or Swall.
0
 
Pete LongTechnical ConsultantCommented:
^^ Thanks for the link Alan

Some experts will disagree about the security of split tunneling - local internet connection is disabled for a reason, an infected remote client with malware on it that's VPN'd in without NAC for example now can connect to the internet unfiltered and connect to your coprporate network.

For that reason I prefer 'forced tunnelling' use the search on the above site I've written about that as well

Pete
0
 
Pete LongTechnical ConsultantCommented:
Heres the link (I was concentrating more on getting a coffee earlier sorry!)

Cisco ASA - Remote VPN Client Internet Access
0
 
Alan Huseyin KayahanCommented:
You are welcome Pete! Great article! (I am MrHusy, been long time! :) )

You know it is enough for a client to be on the unfiltered Internet just for some period in order to get infected so you should basically eliminate the chances of evading the VPN client. Unfortunately Cisco is not good at VPN Client softwares (much better with Anyconnect but still...), features like forced reconnect and auto connect on startup are easily alterable. Built-in VPN clients in OSes gives the option of unchecking using default gateway.

I have worked in a project where 600+ payment IBM kiosks were connected via VPN client. That was one of the times where we needed the security of full tunnelling and I had to go to the extremes of user restrictions,scripting, programming and GPOs (you know how cumbersome to maintain GPOs on RA VPN clients) in order to prevent the user evade the VPN client and reach unfiltered Internet.

So the full tunneling is secure if it is properly forced. A properly forced tunnel renders the client computer a restricted dummy platform.
0
 
Pete LongTechnical ConsultantCommented:
:)
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

  • 3
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now