Re: [fw-wiz] VPN Split-tunneling: Your opinion?
- From: "Aniket S. Amdekar" <aniket_zpm@xxxxxxxxx>
- Date: Fri, 19 Jun 2009 10:46:04 -0700 (PDT)
I agree on the fact that the split tunnel does open up an attack surface, but if the VPN software also has an inbuilt firewall with stateful inspection, nothing like it.
If your corporate network as a Network Access Policy set, then as soon as you enter the company network, your machine will be scanned and remediated in a saperate VLAN if found Infected. So, a split tunnel would be risky without some NAC enforcement in the corporatement. As far as routing malecious packets in the corporate network using split tunnel is concerned, stateful inspection should take care of it.
At the firewall, when you setup the VPN policy, you can control if you want to allow broadcasts flowing through the tunnels.
--- On Fri, 6/19/09, Paul Melson <pmelson@xxxxxxxxx> wrote:
From: Paul Melson <pmelson@xxxxxxxxx>
Subject: Re: [fw-wiz] VPN Split-tunneling: Your opinion?
To: "'Firewall Wizards Security Mailing List'" <firewall-wizards@xxxxxxxxxxxxxxxxxxxxx>
Date: Friday, June 19, 2009, 7:01 PM
I was wondering what each of your opinions are RE: VPN Split-tunneling.from a security > point of view? Compared to typical (modern) exploits such
Do you consider a split-tunnel setup to be particularly risky to allow
as trojans via email, XSS,
web based attacks, etc - do you think that the risk of a client becomingmisconfigured > and allowing routing into the private network via a split
tunnel is particularly
I think, for client VPN configurations, that split tunnel versus full tunnel
setups are a dead horse. The original thinking was that you didn't want a
computer to be simultaneously connected to a trusted network and an
untrusted network. If those requirements are still part of your
architecture, then do full tunnel. But in terms of actual risk, by having
the client machine run with a host firewall that doesn't allow incoming
connections (which is pretty standard fare for all vendors), you address the
risk of someone bouncing through your clients from an untrusted network.
Are there still attacks against VPN client systems that can get by a host
firewall? Absolutely. However, full tunnel does little to nothing to
prevent them. Most malware we see today does some form of phone-home from
the client for C&C. If your full tunnel VPN configuration allows connected
clients to access the Internet, that phone-home is still going to work
(though centralized firewall & IPS will be in play). Even if your full
tunnel setup prevents C&C, malware can still get on the client while it's
disconnected and will gain access to your trusted network when the client
connects. Having live C&C is not a necessity for theftware to pilfer data
off of file shares or have a worm spread across the VPN tunnel.
firewall-wizards mailing list
firewall-wizards mailing list
- Prev by Date: Re: [fw-wiz] VPN Split-tunneling: Your opinion?
- Next by Date: Re: [fw-wiz] Cisco AnyConnect Remote Access to L2L tunnels
- Previous by thread: Re: [fw-wiz] VPN Split-tunneling: Your opinion?
- Next by thread: [fw-wiz] layer2 tunneling with proxy arp