>> Questions;
>> 1. Is it possible to compromise the network security behind FW-A using
>> the VPN connection established between the users' clients and FW1-B?
>> That is, can machines behind FW1-B get into the network behind FW1-A
>> with this arrangement?

>Always.

How is this diferent to SSL?  I understood that was an acceptable model to
use.  Is it because it's browser based, or is it just another insecure model
anyway.

*** This E-Mail has been checked for viruses ***
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to