![]() ![]() ![]() If you haven’t registered for SpiceWorld yet - Watch this! Spiceworks.Most people simply don't have/take the time for such added 'traps'. It all depends on how deep you want (need) to go.and if you have the time for it. That would be some kind of early warning, that something is not as it should be, at the remote location. email) if any other IP address or port would be tried to access over the tunnel. So in case, you would one day add a second device to access in Lan2, you would not have to mess with the tunnels - while at the same time, firewall rules may be set to trigger an alarm (e.g. When looking from a cybersecurity viewpoint, it is not so bad to 'allow' the remote client a VPN tunnel route for the complete Lan2 - but than limit it with firewall rules. I prefer an option with a temporary data storage that is periodically transferred to the main data storage on the main network. ![]() ![]() There exists software called 'bouncers' that are also some kind of general purpose proxy/forwarders, but I wouldn't mess with that. Seen some kind of SQL Gateway, but I think, that this is for some other purpose. I don't know, if something like that exists for SQL server. he would not get to any files, as they are not stored there. This intermediate server is pretty simple to set up and is completely transparent to the user. It than acts like a real SFTP server, just that the files are actually streamed to a different server on the trusted network. Some protocols, like SFTP allow you to set up a proxy in such a DMZ. Going further can I limit the connection over VPN to just 1433 to this single IP/server? Can I limit the connection to just 1 IP on the local address side such that anyone on the remote side can just access this server? Using Fortinet 60F I have a IPSEC VPN setup. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |