|
VPN clients generally have the ability to do
split-tunneling -- which means they use the VPN for certain things and the local
LAN connections for others. This feature does not need to be enabled
though. If you do not allow split tunneling, ALL traffic "should" go
through the VPN connection.
Above and beyond, it is generally a good idea to
have all untrusted partied (consultants, third parties, etc.) on a different LAN
segment with restricted access.
AND
Not that you want to rely entirely on others for
anything -- it is considered good practice to control outbound connections
FROM "your" network. There are legal reasons as well these days.
With that in mind, DuPont in this case should have restrictions on their inbound
and outbound VPN connections.
|
- [FW-1] Opening checkpoint fw-1 to for Cisco VPN Perrymon, Josh L.
- Re: [FW-1] Opening checkpoint fw-1 to for Cisco VPN Brad Rusnak
- Re: [FW-1] Opening checkpoint fw-1 to for Cisco VPN Lars Troen
- Re: [FW-1] Opening checkpoint fw-1 to for Cisco VPN Jeffrey Shuron
- Re: [FW-1] Opening checkpoint fw-1 to for Cisco VPN Lars Troen
- Re: [FW-1] Opening checkpoint fw-1 to for Cisco VPN Perrymon, Josh L.
- Re: [FW-1] Opening checkpoint fw-1 to for Cisco VPN Erkucuk, Ozgur
- Bill
