Nortel 1010 用户指南

下载
页码 178
86 Chapter 4 Configuring user tunnels
NN46110-500 
 
The security of a mandatory tunnel is partially compromised by the addition of 
inverse split tunneling in a way similar to that of split tunneling. However, inverse 
split tunneling 
 does have a significant security advantage over split 
tunneling in that you specify the network resources that are allowed outside the 
tunnel. Split tunneling allows access to any network resource outside of specified 
split tunnel networks. 
Configuration is available through the GUI and the CLI of the Nortel VPN Router. 
The Profile > Groups window of the Nortel VPN Router GUI allows the addition 
of inverse split tunnels. 
Figure 11   Inverse Split Tunneling