Eric Cope wrote:
> is this because you can rely on the VPN to properly protect access to
> it through the vpn mechanisms?
> Eric
That should never be a consideration when you think about it. Most of
the attacks on systems come from INSIDE the network.
I have had systems across a VPN between tribal networks that were not
allowed to communicate except a single machine on one side to a single
machine on the other and we had rules in the VPN to control the traffic
between those machines. There are lots of reasons for rules inside a
tunnel but usually a tunnel is just between a single machine and some
other device. In my case I had two VPN boxes connecting to networks...
nathan
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss