beautypg.com

Configuring inverse split tunneling – Panasonic 7 User Manual

Page 85

Attention! The text in this document has been recognized automatically. To view the original document, you can use the "Original mode".

background image

Chapter 4 Configuring user tunnels 85

LDAP search allows you to enter any LDAP database attribute that is part

of the person, organizational Person, or inetOrgPerson object database

(for example, cn=common name or sn=surname) to generate the
associated user’s profile. Refer to your LDAP vendor’s documentation for

complete details.

Configuring inverse split tunneling

Inverse split tunneling (Figure 10) provides the flexibility of allowing remote

users access to network resources outside of the mandatory tunnel while still

maintaining most of the security advantages of this tunnel type.

Figure 10 Inverse Split Tunneling

Nortel VPN Router Configuration — Basic Features