Created on 11-06-2008 04:42 PM
Created on 01-15-2009 11:34 AM
The protocol https is alwas open from inside to outside like http to enable normal browsing. The trick is the power on the pc when share its connections. The nac device will see a trust mac addrees, a trust user and a trust ip addrees using https to the outside world. Then the netscreen device will do a routed ipsec vpn over the existing ssl vpn. So man-in-the-midle will not see the trafficIf you configure the ssl-vpn policy so that not the lan/subnet is routed, but only the devices you want to be accessed, you already have some control. Second, i do not allow all protocols on the ssl-vpn, so your ipsec routed whatever won' t work, and there i have the missing control in this policy. Third, i use tokens with ' one time passwords + PIN' to access the ssl-vpn webportal, so i know who' s doing what at which time on the ssl-vpn what makes another layer of security. Further more u can restrict some more with custom ips configs i think to add more security in the ssl-vpn. And yes, no network is 100% secure, depends alot on the company' s policy' s and culture, and skills of head admin i guess. My 2 cents...
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1748 | |
1114 | |
764 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.