If all else fails, set up as many machines as necessary in a DMZ, and hook them up to an IP KVM. If all you need is one machine, a Lantronix Spider would be worth investigating.
Several of the other ideas will be more workable, but this will also work, albeit at some expense. Kurt On Mon, Feb 13, 2012 at 06:32, Sam Cayze <[email protected]> wrote: > Concerned about this, not sure how to proceed, and this is a first for me. > > A long time customer has suddenly required that we access their B2B portal > via installing their VPN software, essentially connecting to their network > in order to access the portal. (We in the past, and going forward, we > utilize heavily). > > My concerns: > They gave us 1 day notice. (Hardly, more like 12 hours). They emailed us > Sunday and expected that I have the vpn clients installed on all PCs by the > AM. > I have no idea of their security on the tunnel, and what lies on their > network that could seep onto our machines. > Their tunnelling policy is not to my liking... It hijacks all our > connections, so that our users would not be able to print, access email, > file servers, our gateway, etc. (Which might be safer... the networks > essentially can't talk to each other.) So there would be no way our users > could get anything done with the connection active. > By their short notice and poor planning, the poor documentation, and the > badly configured installer they gave us, I just don't have much trust in the > system and their security practices. > > I know this must happen elsewhere with B2B stuff, is there a model I should > be following? Questions I should be asking? Agreements and security > policies to be signed? I would sure think so. > > In the mean time, I'm going to set up a dumb-kiosk on an isolated network > with the VPN software so my users can at least walk up to it and access what > they need so our projects keep moving. I'm going to try and address my > concerns with them, but from what I hear, their IT dept is quite hard to > work with, if you can even get anyone to help. (It's a very large company). > > Any thoughts and suggestions would be highly appreciated. TIA. > > Sam > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
