Hi All,
Not sure this is possible.....
Pix 515E with 6.2(1). VPN Client 3.6.3.
The 'powers that be' want to have internet access while they are VPN'd into the LAN. I am aware of the security implications that this brings, of the price of the VPN concentrator that would do the job, of the overhead on our net connection if I were to have a proxy in place and of the general method of implementing split-tunnels.
However, as this functionality i still required, I am stuck rather between a rock and a hard place. I then thought that if i could limit the open ports on the split-tunnel ACL, I could only allow access to certain features on our network like Outlook, filestore browsing and so on (nothing too fancy is required). This would mean that I could at least tip a nod towards network security and not leave all the umpteen thousand ports open on the firewall for script-kiddies to nose around in.
Now, with the Split-tunnel ACL's, the source and destination addresses are back to front, and everytime I try and lock down some ports (even with a permit ip any any statement at the bottom) I cannot get the internet anymore.
EG, with:
access-list acl_test permit ip 192.168.3.0 255.255.255.0 192.168.5.0 255.255.255.0
All is fine
As soon as you specify a port on the end, no dice. I suspect this isn't going to work as the SA/DA are the other way around, but would like to know for sure.
If this is the case, any ideas of a frig? I would like to offer split-tunnel, but only have certain features available - say ports 80, 21, 23, and 443, with everything else barred at the f/w.
Any ideas gratefully listened to.
Thanks a lot.
Jim..
Not sure this is possible.....
Pix 515E with 6.2(1). VPN Client 3.6.3.
The 'powers that be' want to have internet access while they are VPN'd into the LAN. I am aware of the security implications that this brings, of the price of the VPN concentrator that would do the job, of the overhead on our net connection if I were to have a proxy in place and of the general method of implementing split-tunnels.
However, as this functionality i still required, I am stuck rather between a rock and a hard place. I then thought that if i could limit the open ports on the split-tunnel ACL, I could only allow access to certain features on our network like Outlook, filestore browsing and so on (nothing too fancy is required). This would mean that I could at least tip a nod towards network security and not leave all the umpteen thousand ports open on the firewall for script-kiddies to nose around in.
Now, with the Split-tunnel ACL's, the source and destination addresses are back to front, and everytime I try and lock down some ports (even with a permit ip any any statement at the bottom) I cannot get the internet anymore.
EG, with:
access-list acl_test permit ip 192.168.3.0 255.255.255.0 192.168.5.0 255.255.255.0
All is fine
As soon as you specify a port on the end, no dice. I suspect this isn't going to work as the SA/DA are the other way around, but would like to know for sure.
If this is the case, any ideas of a frig? I would like to offer split-tunnel, but only have certain features available - say ports 80, 21, 23, and 443, with everything else barred at the f/w.
Any ideas gratefully listened to.
Thanks a lot.
Jim..