Configuring inverse split tunneling
Inverse split tunneling
users access to network resources outside of the mandatory tunnel while still
maintaining most of the security advantages of this tunnel type.
Figure 10 Inverse Split Tunneling
•
LDAP search allows you to enter any LDAP database attribute that is part
of the person, organizational Person, or inetOrgPerson object database
(for example, cn=common name or sn=surname) to generate the
associated user's profile. Refer to your LDAP vendor's documentation for
complete details.
(Figure 10)
Chapter 4 Configuring user tunnels 85
provides the flexibility of allowing remote
Nortel VPN Router Configuration — Basic Features