![]() ![]() In a couple of words you we can explain this process as follow. Split tunneling in remote access VPN is realized usually by authorization process. Previously it was also Cisco VPN Client, but it is End of Life and End of Support today. ![]() Also the client is usually Cisco An圜onnect now. So all the configuration is done at the VPN head-end, which is usually Cisco ASA nowadays if we speak about Cisco Systems. In case of remote access VPNs either we use IPSec of SSL, we don’t have any access-lists configured at the client side. Interesting traffic means that IP packets of this flow correspond to source/destination IP addresses and/or transport ports in access-list associated with VPN. ![]() If we speak about ordinary IPSec VPN, such splitting is achieved by access-lists (ACL), which chose interesting traffic. In case of the VPN tunnel we split the traffic so that one its part is send through the tunnel, whereas the second part is sent normally via your local network (LAN). The main idea of spilt tunnelingįrom the wording itself you can understand that we split something. And though they are not necessary related to SP filed, they have a significant practical value and can help you to shorten the time for implementation and troubleshooting of the networking solutions. On the other hand there are a lot practical cases that happen at my job. One of the main objectives of my blog is to help you and me with preparation for CCIE SP. Both Cisco VPN Client and Cisco An圜onnect Client provide you such possibility, so we will compare them and outline the differences in configuration. It’s quite good technology that can help you to introduce new services into your network on per user basis without necessity of building Site-to-site VPN. In this article I want to cover the topic of the split tunneling, which is part of VPN technologies. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |