1 |
lee <lee@××××××××.de> wrote: |
2 |
|
3 |
> Rich Freeman <rich0@g.o> writes: |
4 |
> |
5 |
> > On Sun, Jan 17, 2016 at 6:38 AM, lee <lee@××××××××.de> wrote: |
6 |
> >> Suppose you use a VPN connection. How do does the client |
7 |
> >> (employee) secure their own network and the machine they're using |
8 |
> >> to work remotely then? |
9 |
> > |
10 |
> > Poorly, most likely. Your data is probably not nearly as important |
11 |
> > to them as their data is, and most people don't take great care of |
12 |
> > their own data. |
13 |
> |
14 |
> That's not what I meant to ask. Assume you are an employee supposed |
15 |
> to work from home through a VPN connection: How do you protect your |
16 |
> LAN? |
17 |
|
18 |
Depends on the VPN connection. If you use an OpenVPN client on your PC |
19 |
then it is sufficient to use a well configured firewall (ufw, iptables |
20 |
or whatever) on this PC. If you use a VPN gateway then you could |
21 |
configure this gateway (or a firewall behind) in a way that it blocks |
22 |
incoming connections from the VPN tunnel. |
23 |
|
24 |
IMHO there is no more risk to use a VPN connection than with any other |
25 |
Internet connection. |
26 |
|
27 |
-- |
28 |
Regards |
29 |
wabe |