|
|
Question : Problem: sonicwall global vpn client app kills internet
|
|
hi all. first time to ask a question because i have never needed to. here goes:
i am having an issue with the sonicwall global vpn client application. everytime i fire up the application it kills my internet connection. this is before i establish any kind of connection with any network. i am working on a laptop via a wireless connection. now here is what i have boiled it down to. my cisco vpn client app runs fine and i can connect to any network with it. straight microsoft vpn connections connect and run fine as well. i have tried it with and without all firewalls and security software. same deal. also, on my same network with a desktop wired into the router, this application works fine and connect to all networks. so, it is something that is confilcting on my laptop only. i have attached an output log from the vpn application so that maybe that can provide some insight. if i have left anything out, please ask.
*** LOG MESSAGES ***
2006/12/06 00:11:12:222 Information The ISAKMP port (500) is already in use. Port 1678 will be used as the ISAKMP source port. 2006/12/06 00:11:12:983 Information The ISAKMP port (500) is already in use. Port 1680 will be used as the ISAKMP source port. 2006/12/06 00:11:13:123 Information SonicWALL Global VPN Client version 3.1.0.556
|
Answer : Problem: sonicwall global vpn client app kills internet
|
|
2 thoughts: 1) Many VPN clients will not run when another VPN client is already installed. Has to do with the IPSec service being associated with the other VPN client already, even though it is not in use. Seems to me this is the case with the Sonicwall, which I believe is actually a SafeNet client, which definitely will not run if another IPSec client has already been installed. 2) Though your error message is not indicative of this problem, your VPN may not allow split-tunneling. Split-tunneling allows access to the 2 networks, the VPN, and local networks, and is a security feature. While the VPN is connected it blocks all local activity, including local Internet access, and therefore protecting the remote, corporate office, from un-invited guests through a back door. As a rule, this is enabled by default on most VPN clients. In the case of the Cisco it is administered by the system admin looking after the VPN router configuration. On the Windows VPN client there is an option "use default gateway on remote network", which can be unchecked on the VPN client. As to how you dis-enable on the Sonicwall Client, I don't know but I am sure someone else here will be able to help, or perhaps you can locate it in the router or client's config. It will likely be referred to as something similar to remote gateway, split-tunneling, or split-horizon.
Just food for thought.
|
|
|
|