MicroNugget: What is Split Tunneling with Virtual Private Networks?

  Рет қаралды 43,639

CBT Nuggets

CBT Nuggets

Күн бұрын

Start learning cybersecurity with CBT Nuggets. courses.cbt.gg/security
In this video, Keith Barker covers split-tunneling with VPNs. Keith explains what split tunneling is, when and why you'd want to use it, how to set it up on an ASA, and how to verify that it's working properly - all in service to keeping a VPN running fast.
VPN tunnels are great tools that are enjoying increasing popularity in many businesses and organizations that have users working remotely. That popularity stems from their many strengths: authentication is ensured because we only set up tunnels for trusted users, data integrity is maintained by the very nature of how traffic moves through a VPN tunnel, and confidentiality is a given as well because encryption is used at every step. But VPNs come at a cost of overhead - if an external user wants to access the internet on a VPN, gateways can quickly become bloated and slow. It's quick work to manually configure an ASA to set a split tunneling policy and then head to the command line to verify the VPN settings. Speed up your VPN tunnels with VPN split tunneling and smart routing.
🌐 Download the Free Ultimate Networking Cert Guide: blog.cbt.gg/02zu
⬇️ 13-Week Study Plan: CCNA (200-301): blog.cbt.gg/39fo
Start learning with CBT Nuggets:
• Cisco CCNP Security | courses.cbt.gg/6t4
• Intro to Networking | courses.cbt.gg/tuv

Пікірлер: 22
@emmjay2525
@emmjay2525 3 жыл бұрын
Exactly. I was clear and easy to understand
@KeithBarker
@KeithBarker 11 жыл бұрын
That can be done at the user or group level. There is an option called a Dynamic Access Control List (DACL) that allows this granularity and can be based on user, group or even the security posture of the device that is connecting. Thanks for the question, Keith Barker
@pradeep7270
@pradeep7270 4 жыл бұрын
Explained in simple way, thank you
@arashtntdalila
@arashtntdalila 4 жыл бұрын
absolutely clear explanation
@Littleanimalsarecute
@Littleanimalsarecute Жыл бұрын
Quick and informative. 🐿👍
@neyvie
@neyvie 4 жыл бұрын
Amazing video, so easy to understand.
@faizanmahmood3699
@faizanmahmood3699 7 жыл бұрын
Great Video and very easy to understand. you are a great teacher Keith. if we want to also nat the full tunnel traffic so that the user can access the intranet and internet both how can we do that ? kindly tell the options. except the split tunneling .
@aquadir2830
@aquadir2830 3 жыл бұрын
You're a fantastic faculty n master of all the master's...
@DaBBoSaH
@DaBBoSaH 9 жыл бұрын
wow that was amazing, very clear... thanks a lot
@kool1311
@kool1311 4 жыл бұрын
very clear, thank brother.
@mohitram7243
@mohitram7243 2 жыл бұрын
you are the best!!
@zhajili1991
@zhajili1991 8 жыл бұрын
Thanks !
@1989SeanSmith
@1989SeanSmith 3 жыл бұрын
Quick question. In the initial example, you said that you can still access normal websites when using a full tunnel (live video stream in your example) but the connection would just be a little slower due to encryption taking place. If this is the case, why wasnt Keith able to access Google when he connected to the vpn until he set up the split tunnelling?
@johnstem5538
@johnstem5538 5 жыл бұрын
Hi Keith, what happens if you uncheck Inherit for Policy and choose Tunnel Network List Below, then you check Inherit for the Network List? I have that set up on my firewall and it inherits an ACL which is in the Network List if you uncheck Inherit and click Manage to select it. Why does it select that ACL if Inherit is checked? I can see it in the Anyconnect client where it shows the secured routes, and i have internet connection, so split tunneling is working. I am really not following this, the internet connection should not be working. Thx
@technisar
@technisar 11 жыл бұрын
I am not sure about ASA but we can do this on a Juniper SSL VPN . You can create roles for both the users. Eg Role A for Bob and Role B for Cat, Then we can control what they access using ACL's. lets say you want Bob to access only a server (10.9.222.210) and Cat another one 10.9.222.45. Then the policy would look something like this .. Policy1>> 10.9.222.210/32 Allow Role A Policy2 >> 10.9.222.45/32 Allow Role B The above mentioned are NOT commands that you can execute from a CLI.
@swizkniv
@swizkniv 11 жыл бұрын
Hi: Is it possible to have ASA ( or any other VPN device for that matter), to control access to devices behind the ASA based on the VPN users/group? I.e. User Bob--> Server 1 only, User Cat--> Server 2 Only. Each user may even have different ip network...Bob could be assigned 192.168.10.10 and Cat could be assigned 192.168.20.10..
@minhtruong6935
@minhtruong6935 11 жыл бұрын
good job.
@kristianjudealcala5858
@kristianjudealcala5858 2 жыл бұрын
Can we implement a layer 4 split tunneling.?
7 жыл бұрын
Fantastic;
@bluerfoot
@bluerfoot 3 жыл бұрын
don't go to cnn go to cbt.
VPN Types Options and Protocols Explained
10:24
CBT Nuggets
Рет қаралды 24 М.
IP Sec VPN Fundamentals
14:55
LearnCantrill
Рет қаралды 154 М.
Double Stacked Pizza @Lionfield @ChefRush
00:33
albert_cancook
Рет қаралды 80 МЛН
MicroNugget: How to Use NAT and Auto-NAT on ASA 8.3 and 8.4
8:59
VPN Split Tunneling: The Benefits and Risks
8:01
F5 DevCentral
Рет қаралды 37 М.
How Hackers Move Through Networks (with Ligolo)
20:01
John Hammond
Рет қаралды 260 М.
VPN (Virtual Private Network) Explained
7:11
PowerCert Animated Videos
Рет қаралды 572 М.
Why I no longer use a VPN (most of the time) and nor should you
11:25
Sun Knudsen
Рет қаралды 1,2 МЛН
VPNs Explained | Site-to-Site + Remote Access
9:08
CertBros
Рет қаралды 819 М.
MicroNugget: VLANs Explained | CBT Nuggets
8:24
CBT Nuggets
Рет қаралды 144 М.
Social Engineering - How Bad Guys Hack Users
14:58
IBM Technology
Рет қаралды 48 М.