On 3 Aug 2003, Ron Johnson wrote:

> On Sun, 2003-08-03 at 01:50, Alvin Oga wrote:
...

> > f) if you allow vpn from home and wireless access to internal servers
> >    than you've got some serious "network security policy and enforcement"
> >    problems
> 
> Not as much as you might think.

i'd be worried about the home fw, home router, esp if its linux ( x86
based ) ...  and less worried about the windoze boxes behind the fw
        -- all traffic goes out/in thru the home users fw and/or gw ...
        and that's the box i'd worry about as it'd be the first point
        of attack to the home lan  or its dns servers

        - lots of ways to get into the corp lan from the relatively
        less secure "home" network

        - but the corp security folks' home lan is probably
        tighter than the corp lan they maintain to keep the 
        ceo/cfo/foo-managers happy and off the admin's back by 
        opening a hole here and bigger hole there because
        the managers can't do their jobs due to security restraints

        - and who's the one losing the laptops when on the road ??

        i worked at a place where 10% - 20% of the laptops were
        either stolen or "dropped and thrown away" and they want
        a new laptop  .. that company went "poof" in a cloud of blue 
        smoke

c ya
alvin
 
> On my work-from-home computer (WFH), which, unfortunately, is Win2k,
> there are 2 NICs, 1 for the outside world (that is connected to the
> cable modem via a switch), and 1 for the internal LAN.
> 
> When I fire up the VPN s/w (which I configured to use the "outside 
> NIC"),  it disables the "inside NIC", thus closing off a bad security
> loophole.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to