MicroNugget: What is Split Tunneling with Virtual Private Networks?

Поделиться
HTML-код
  • Опубликовано: 9 июл 2024
  • Start learning cybersecurity with CBT Nuggets. courses.cbt.gg/security
    In this video, Keith Barker covers split-tunneling with VPNs. Keith explains what split tunneling is, when and why you'd want to use it, how to set it up on an ASA, and how to verify that it's working properly - all in service to keeping a VPN running fast.
    VPN tunnels are great tools that are enjoying increasing popularity in many businesses and organizations that have users working remotely. That popularity stems from their many strengths: authentication is ensured because we only set up tunnels for trusted users, data integrity is maintained by the very nature of how traffic moves through a VPN tunnel, and confidentiality is a given as well because encryption is used at every step. But VPNs come at a cost of overhead - if an external user wants to access the internet on a VPN, gateways can quickly become bloated and slow. It's quick work to manually configure an ASA to set a split tunneling policy and then head to the command line to verify the VPN settings. Speed up your VPN tunnels with VPN split tunneling and smart routing.
    🌐 Download the Free Ultimate Networking Cert Guide: blog.cbt.gg/02zu
    ⬇️ 13-Week Study Plan: CCNA (200-301): blog.cbt.gg/39fo
    Start learning with CBT Nuggets:
    • Cisco CCNP Security | courses.cbt.gg/6t4
    • Intro to Networking | courses.cbt.gg/tuv

Комментарии • 22

  • @Littleanimalsarecute
    @Littleanimalsarecute Год назад

    Quick and informative. 🐿👍

  • @emmjay2525
    @emmjay2525 3 года назад +2

    Exactly. I was clear and easy to understand

  • @pradeep7270
    @pradeep7270 4 года назад +2

    Explained in simple way, thank you

  • @arashtntdalila
    @arashtntdalila 4 года назад +3

    absolutely clear explanation

  • @KeithBarker
    @KeithBarker 11 лет назад

    That can be done at the user or group level. There is an option called a Dynamic Access Control List (DACL) that allows this granularity and can be based on user, group or even the security posture of the device that is connecting.
    Thanks for the question,
    Keith Barker

  • @neyvie
    @neyvie 4 года назад +1

    Amazing video, so easy to understand.

  • @DaBBoSaH
    @DaBBoSaH 9 лет назад +2

    wow that was amazing, very clear... thanks a lot

  • @aquadir2830
    @aquadir2830 3 года назад

    You're a fantastic faculty n master of all the master's...

  • @kool1311
    @kool1311 4 года назад +1

    very clear, thank brother.

  • @mohitram7243
    @mohitram7243 2 года назад

    you are the best!!

  • @zhajili1991
    @zhajili1991 8 лет назад

    Thanks !

  • @faizanmahmood3699
    @faizanmahmood3699 7 лет назад +2

    Great Video and very easy to understand. you are a great teacher Keith.
    if we want to also nat the full tunnel traffic so that the user can access the intranet and internet both how can we do that ? kindly tell the options.
    except the split tunneling .

  • @minhtruong6935
    @minhtruong6935 11 лет назад

    good job.

  •  7 лет назад

    Fantastic;

  • @1989SeanSmith
    @1989SeanSmith 3 года назад

    Quick question. In the initial example, you said that you can still access normal websites when using a full tunnel (live video stream in your example) but the connection would just be a little slower due to encryption taking place. If this is the case, why wasnt Keith able to access Google when he connected to the vpn until he set up the split tunnelling?

  • @kristianjudealcala5858
    @kristianjudealcala5858 2 года назад

    Can we implement a layer 4 split tunneling.?

  • @johnstem5538
    @johnstem5538 5 лет назад

    Hi Keith, what happens if you uncheck Inherit for Policy and choose Tunnel Network List Below, then you check Inherit for the Network List?
    I have that set up on my firewall and it inherits an ACL which is in the Network List if you uncheck Inherit and click Manage to select it.
    Why does it select that ACL if Inherit is checked? I can see it in the Anyconnect client where it shows the secured routes, and i have internet connection, so split tunneling is working.
    I am really not following this, the internet connection should not be working.
    Thx

  • @swizkniv
    @swizkniv 11 лет назад

    Hi:
    Is it possible to have ASA ( or any other VPN device for that matter), to control access to devices behind the ASA based on the VPN users/group? I.e. User Bob--> Server 1 only, User Cat--> Server 2 Only. Each user may even have different ip network...Bob could be assigned 192.168.10.10 and Cat could be assigned 192.168.20.10..

  • @technisar
    @technisar 11 лет назад

    I am not sure about ASA but we can do this on a Juniper SSL VPN . You can create roles for both the users. Eg Role A for Bob and Role B for Cat, Then we can control what they access using ACL's.
    lets say you want Bob to access only a server (10.9.222.210) and Cat another one 10.9.222.45.
    Then the policy would look something like this ..
    Policy1>> 10.9.222.210/32 Allow Role A
    Policy2 >> 10.9.222.45/32 Allow Role B
    The above mentioned are NOT commands that you can execute from a CLI.

  • @bluerfoot
    @bluerfoot 3 года назад

    don't go to cnn go to cbt.