nanog mailing list archives

Re: Level3 routing issues?


From: alex () yuriev com
Date: Mon, 27 Jan 2003 15:18:05 -0500 (EST)


On Mon Jan 27, 2003 at 03:03:09PM -0500, alex () yuriev com wrote:
Alex, although technically correct, its not practical.  How many end users
vpn in from home from say a public ip on their dsl modem leaving
themselves open to attack but now also having this connection back to the
"Secure" inside network.  Has anyone heard of any confirmed cases of this
yet?
So then they are using a wrong tool. Using a wrong security tool tends to
bite one in the <censored>.

So what's the right tool? Yes, dial or dsl directly into corporate network
is my preferred option, but doesn't fit the corporate plan for the future.

Use a client that will push down corporate policy to the client.

Yes, I have seen attacks mounted via VPNs. Work like charm.

As I suspected, but I keep being told that these problems were in old style
VPN clients, and stuff is much better these days. I remain unconvinced.

VPN client creates a fake IP interface. If that interface deos not get the
policy of a corporate network, you have an open enterance. Some of the
clients (such as the ones CheckPoint has) do that. Others dont.

Alex


Current thread: