Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. If you'd prefer to explore, try our test area to get started. And see here for current known issues.

New Member

L2TP & Split Tunneling

Hello,

This is more of a conversation, looking for input on some issues that have come up while trying to get L2TP in place.

The PIX in question (Pix 515 ver 6.3) has been running a VPN in tunnel mode that allowed cisco VPN clients to connect. However, a change in the network layout has the PIX outside interface IP address change to a private address. A Load balancer now sits infront of the PIX. From my reading, i had to change my VPN from tunnel to transport mode. Since the VPN call would be made to the Load balancer interface, which would then NAT to the Outside PIX interface. This NAT process would break IPSEC Transport, and tunnel is what i went with. In so far could someone please tell me if this decision was correct? As the direction i took led me to the next question:

L2TP Transport mode is what i have now deployed in my test environment. Works fine. Except for Split tunneling. L2TP does not support split tunneling. This is what i have read so far and i could be wrong. But so far it does not suport split tunneling. I thus have 2 questions as regards split tunneling:

What are the thoughts on split tunneling and the dangers it poses to a network when enabled, And are there any work arounds to allowing clients connected to the VPN via L2TP access to the Internet?

many thanks for your time.

.a

2 REPLIES
Silver

Re: L2TP & Split Tunneling

L2TP and split tunneling can work in your case. On the client side uncheck the box for "Use default gateway on remote system". This is in the General tab of the Advanced TCP/IP settings. On PIX configure following group policy parameters

split-tunnel-policy tunnelspecified

split-tunnel-network-list value split_tunnel

split-dns value cisco.com

intercept-dhcp 255.255.255.0 enable

Also configure access lists with the split tunnel network as source network

New Member

Re: L2TP & Split Tunneling

Hi,

Split tunneling opens a backdoor to your protected network via the VPN client so care must be taken.

I had a similar configuration problem with 3000 series VPN concentrators. The concentrators now work as dhcprelay to an DHCP server on the inside network. The DHCP scope has, among others, option 249 enabled (classless static routes). When clients receive an IP address also the routes are set (in the client VPN config the option 'use desfault gateway on the remote network' has to be unchecked).

You might be able to do something similar.

Regards, Frank

495
Views
0
Helpful
2
Replies