I am currently running Windows 7 32bit. I have both the Cisco VPN client and the Shrew Soft VPN client, both work as expected. The only problem is that I lose connection with the internet so I cannot browse Google, etc.
-
Looks like you are becoming part of the corporate network (or whatever network you are connecting thru vpn) and you might have to use their proxy in ur browser to be able to browse.
Keiran Holloway : either that or your routes are messed up and it is trying to send everything via the VPN which ain't working out too well for you.3dinfluence : Split tunneling isn't always allowed by the VPN.Nathan Fisher : That is correct. I am connecting to a corporate network from an ADSL connection at home.Nathan Fisher : @3dinfluence. Split tunneling is an option is it?Zypher : @Nathan Fisher: the spit tunneling policy is setup by the network admin in charge of the VPN endpoint. You can't control it on the client side. A lot of corporation do not enable split tunneling as a security measure.Home Boy : Some VPN solutions also provide you an option to connect using browser, instead of a VPN stand-alone client application. In such a split tunnel is established on the browser session only and you could continue to connect to other sites, internet apps...From Home Boy -
run wireshark and listen on your nic. request a web page and see where the packets go.
From dasko -
The Cisco VPN Client has an option for "Split Tunneling".
This allows you to see your network and the connected VPN Network at the same time.
What sounds like is happening is when you connect to the VPN Host they do not have this option enabled, therefore you use their resources for everything. If you want to surf the web it would be off their connection, ISP, IP Addresses etc. If they have locked this down you would not be able to do so.
I had a similar problem where I could not see my network printer at home once I VPN'd in until split tunneling was enabled.
From Gary Steven -
It is standard practice to route ALL of your traffic over a VPN connection while connected.
There is often a setting within the client to only send traffic destined for that particular network over the VPN connection, but this is called split-tunelling, and is considered a security risk. The problem is that an attacker could gain access to your computer over your regular connection (virus/backdoor/etc), and they would now have access to your corporate network via the VPN - effectively bypassing any security your corporate network has put in place.
From Brent -
This is a common configuration, as Home Boy and others have noted.
The best solution is to run your VPN session, and associated work, inside of a virtual machine (VMWare, Virtual Box, or whatever you choose) so that only that box's network is impacted.
From Jon Lasser
0 comments:
Post a Comment