01-10-2004 09:26 AM - edited 02-21-2020 12:59 PM
Thought I would share an experience with everyone...
All laptops on the network have the Cisco VPN client installed, as most take their laptops on the road or home when they leave at night.
One thing I've noticed when performing vulnerability assessments of the network with various tools, such as IS Scanner, STAT scanner, etc... is this:
If the client I am on has the VPN client installed and the machine I'm targeting has the VPN client installed, I cannot communicate to perform the scan.
ICMP traffic between the 2 devices will not work. This caused me quite a headache until I realized that the only common ground between all the clients I was trying to scan was the fact all were laptops.
All laptops also have personal firewalls for use when on the road. I thought this was the problem and removed the firewalls and still no success.
Finally I thought about the VPN client. So, on the source and the target device I stopped the "Cisco Systems, Inc. VPN Service" and VIOLA, I can scan all systems. Appears that if the source and target machines are running the service, they wont communicate via ICMP.
01-11-2004 09:37 AM
Do the clients have the cisco vpn client statefull firewall (Always On) checkbox checked?
01-11-2004 12:34 PM
They would not have the VPN client connected while at work, so there is not a VPN connection - just the service running. Yes, stateful firewall is the default config for our image... but this shouldn't have an affect if they are not connected to a vpn device.
01-11-2004 02:06 PM
"Always on" means always on, IIRC. I believe it will firewall so long as the service is running, regardless of vpn connection status
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide