<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Split tunneling challenges in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/split-tunneling-challenges/m-p/2527438#M234962</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have requirement that remote users want to use corporate application like file server etc and at the same time they also want to use internet on their system&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what are the options available on firewall to configure this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what kind of security threats and vulnerability challenges wil be there if user access application and internet at same time&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if possible please provide solution with explanation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;rajat&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:44:03 GMT</pubDate>
    <dc:creator>r.kukreja</dc:creator>
    <dc:date>2019-03-12T04:44:03Z</dc:date>
    <item>
      <title>Split tunneling challenges</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-challenges/m-p/2527438#M234962</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have requirement that remote users want to use corporate application like file server etc and at the same time they also want to use internet on their system&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what are the options available on firewall to configure this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what kind of security threats and vulnerability challenges wil be there if user access application and internet at same time&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if possible please provide solution with explanation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;rajat&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:44:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-challenges/m-p/2527438#M234962</guid>
      <dc:creator>r.kukreja</dc:creator>
      <dc:date>2019-03-12T04:44:03Z</dc:date>
    </item>
    <item>
      <title>In general: If the client can</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-challenges/m-p/2527439#M234964</link>
      <description>&lt;P&gt;In general: If the client can directly communicate with the internet, it's easier for an attacker to use that PC as a jump-point into the network or to compromise the client. The typical solutions to give VPN-clients internet-access are:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Place a proxy server into your internal network and reconfigure the proxy-settings of the client to use this proxy. This reconfiguration can be done automatically, controlled by the ASA. This is my favorite solution for company employees. Optionally the proxy could scan the traffic for internet-threats like malware.&lt;/LI&gt;&lt;LI&gt;If you can't or don't want to deploy a proxy you can send all Internet-traffic straight back to the internet. For that you need a NAT-rule (outside,outside) to do dynamic PAT for your VPN-Pool and you have to configure "same-security-traffic permit intra-interface". This is my second choice for company employees. With this, there is no malware scan unless you have a security-module like CX in your firewall. Still, an internet-attacker will not be able to initiate a bidirectional connection to the client. And you have a central logging for client-activity while they are connected to the VPN.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Configure split-tunneling. With that, you only send traffic that is for your company through the tunnel and all the rest is allows directly from the client to the internet. This is the least secure solution. By little misconfiguration of the client (like disabled windows firewall) the PC can be attacked by systems on the internet.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2014 09:19:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-challenges/m-p/2527439#M234964</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-09-10T09:19:21Z</dc:date>
    </item>
    <item>
      <title>Hi, In case if you have a</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-challenges/m-p/2527440#M234966</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In case if you have a sufficient bandwidth available in your office network, go with tunnel all and make everything to go via your office network.... so that you can keep a track on internet..... else another option is to do with split-tunnel for your vpn.... only office lan network will flow through vpn and rest will flow through their local gateway..... means all traffic related to office lan.... whatever you have in internal lan or vpn acl..... it will have routed to vpn gateway and all other ( 0.0.0.0) route will go via local gateway of the end user ISP.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you take things via office network.... you can limit / block the unnecessary ports or protocols to access..... you can keep the content filtering / proxy servers in inside lan to block black listed sites or malware sites......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2014 11:30:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-challenges/m-p/2527440#M234966</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-09-10T11:30:46Z</dc:date>
    </item>
    <item>
      <title>hi karsten, can you elaborate</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-challenges/m-p/2527441#M234967</link>
      <description>&lt;P&gt;hi karsten,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can you elaborate little bit of first solution and second more . please share any practical scenario or any implementation guide if you have. looking forward for your valuable thoughts and suggestion&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;rajat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2014 14:10:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-challenges/m-p/2527441#M234967</guid>
      <dc:creator>r.kukreja</dc:creator>
      <dc:date>2014-09-10T14:10:26Z</dc:date>
    </item>
    <item>
      <title>hi, can any body provide</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-challenges/m-p/2527442#M234968</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can any body provide split tunnelin example on asa version 9.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;rajat&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2014 06:07:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-challenges/m-p/2527442#M234968</guid>
      <dc:creator>r.kukreja</dc:creator>
      <dc:date>2014-09-11T06:07:33Z</dc:date>
    </item>
    <item>
      <title>Hi Rajat,You can refer the</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling-challenges/m-p/2527443#M234969</link>
      <description>&lt;P&gt;Hi Rajat,&lt;/P&gt;&lt;P&gt;You can refer the below link for a config example with explaination.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;http://www.petenetlive.com/KB/Article/0000943.htm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Thu, 11 Sep 2014 06:18:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling-challenges/m-p/2527443#M234969</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-09-11T06:18:24Z</dc:date>
    </item>
  </channel>
</rss>

