86
Chapter 4 Configuring user tunnels
NN46110-500
The security of a mandatory tunnel is partially compromised by the addition of
inverse split tunneling in a way similar to that of split tunneling. However, inverse
split tunneling
(Figure 11)
does have a significant security advantage over split
tunneling in that you specify the network resources that are allowed outside the
tunnel. Split tunneling allows access to any network resource outside of specified
split tunnel networks.
Configuration is available through the GUI and the CLI of the Nortel VPN Router.
The Profile > Groups window of the Nortel VPN Router GUI allows the addition
of inverse split tunnels.
Figure 11
Inverse Split Tunneling
Содержание Contivity 1050
Страница 10: ...10 Contents NN46110 500 ...
Страница 14: ...14 Tables NN46110 500 ...
Страница 22: ...22 Preface NN46110 500 ...
Страница 58: ...58 Chapter 2 Getting started NN46110 500 ...
Страница 74: ...74 Chapter 3 Setting up the Nortel VPN Router 1010 1050 and 1100 NN46110 500 ...
Страница 90: ...90 Chapter 4 Configuring user tunnels NN46110 500 ...
Страница 118: ...118 Chapter 5 Configuring the system NN46110 500 ...
Страница 162: ...162 Chapter 8 Configuring IPSec mobility and persistent mode NN46110 500 ...
Страница 164: ...164 Branch office quick start template NN46110 500 ...
Страница 178: ...178 Index NN46110 500 W Web browser interface 50 Web interface options 53 Welcome display 56 ...