Wireless

Aruba: Split Tunnel with a RAP-5WN

René Jorissen on September 30, 2011 2 Comments • Tags: #apgroup #aruba #networks #profile #rap5 #rap5wn #session #split #tunnel #tunneling #user #userrole #wiredapport #wiredapprofile

Split Tunneling is technique, which is used very often in (SSL) VPN scenario’s. The RAP-5WN access points has multiple Ethernet ports to connect different components, like workstations or printers. You can configure the usual user roles and other settings on these Ethernet ports. You can also configure Split Tunneling per Ethernet port. When using Split … Read More

Configuration Example, Security

Tunneling sessions via Plink

René Jorissen on August 25, 2010 7 Comments • Tags: #plink #ssh #tunnel

Plink stands for PuTTY Link and is a command-line connection tool similar to Unix ssh. As a networking consultant I often need to support customers from remote locations. Access to their networking equipment is mostly blocked from unknown locations. Sometimes it is allowed to directly access networking equipment, like a company firewall, from a known … Read More

Configuration Example, IP Telephony

Strange VPDN-GROUP behavior

René Jorissen on April 1, 2009 1 Comment • Tags: #group #l2tp #receive #receivewindow #tunnel #vpdn #vpdngroup

I noticed some strange behavior in a vpdn-group configuration on a Cisco 876 router. I have a router with the following vpdn-group configuration: vpdn-group pptp-group ! Default PPTP VPDN group description pptp vpn users accept-dialin protocol pptp virtual-template 10 The configuration is working perfectly and users can dialin using a PPTP connection. Backups of the … Read More

Firewalling

VPN Filtering through Group Policy

René Jorissen on January 9, 2009 0 Comments • Tags: #access #connection #filtering #group #lists #permitipsec #permitvpn #policy #sysopt #tunnel #vpn #vpnfiltering

When configuring a Remote Access VPN or a Site to Site VPN connection you have the ability to filter traffic entering and leaving the VPN connection. You have the ability to enable inbound IPsec sessions to bypass interface access lists. Group policy and per-user authorization access lists still apply to the traffic. The sysopt connection … Read More