Lueyen wrote:My office is using Ciscos VPN client to connect to our clients networks. The problem we have is that once connected to the VPN our work stations are effectively disconnected from our own network and we can only see machines on the client network.
What I'm wondering is if it's possible to be connected to both at once with single nic cards at each workstation. The biggest problem I see is that in many cases our clients are using the same ip range on their networks that we use on ours, and this would obviously make being on both at once problematic because the workstation would see duplicated IP addresses. I'm willing to renumber our network, but I'm not sure if the disconnect from our network by the vpn client is due to addressing or simply an automatic function of the vpn client it's self.
Not really sure if your question got answered but some food for thought and how I allow this at the company I work at.
For starters, you allowing both networks to be "connected" (ie. client and your native lan) means you can become a gateway between the two networks. This can very likely break SLA's or create other problems (e.g. you infect your client network with a virus, cause harm to client network ,etc etc). They more then likely do NOT want you to be connected to both networks at the same time. If they know what they are doing, you won't be able to "hack" the cisco vpn client to allow what you're asking. However you could like at other options (add a nic, etc) and even this may be thwarted by the cisco client.
Depending on how the customer configured the cisco client, it should be stopping all network access while VPN is running to ALL other networks but it's own (own meaning the customer network). This is an option via the client config from the server, I doubt you'll be able to adjust much on the cisco client unless the customers don't know how to use it.
WebEx would be a great option and not all that expensive. We use that and a combo of citrix to complete tasks like this.