SYSTEM WARNING: 'file_get_contents(https://www.clearos.com/?rendertype=json&get=header): failed to open stream: Connection refused' in '/var/www/virtual/newwrapper/cf_topmenu.inc' line 5
Anonymous | Login | 2024-12-22 00:06 MST | |
View Issue Details [ Jump to Notes ] | [ Issue History ] [ Print ] |
ID | Project | Category | View Status | Date Submitted | Last Update |
0000121 | ClearOS | app-firewall - Firewall | public | 2010-08-04 11:17 | 2019-11-29 09:16 |
|
Reporter | user2 | |
Assigned To | | |
Priority | normal | Severity | minor | Reproducibility | always |
Status | closed | Resolution | suspended | |
Platform | | OS | | OS Version | |
Product Version | 5.1 | |
Target Version | | Fixed in Version | | |
|
Summary | 0000121: VPN users can bypass content filter policies even when connected from the local LAN |
Description | By default, all VPN connections are trusted and do not pass through content filtering policies on a ClearOS gateway. This makes sense for remote VPN users who -- by definition -- already have a direct connection to the Internet. However, a VPN connection can also be used to bypass filtering policies even when the user is connected on the LAN. |
Tags | No tags attached. |
|
Attached Files | |
|
Relationships |
|
Relationships |
Notes |
Issue History |
Date Modified |
Username |
Field |
Change |
2010-08-04 11:17 |
user2 |
New Issue |
|
2010-08-04 11:19 |
user2 |
Status |
new => confirmed |
2019-11-29 09:16 |
NickH |
Note Added: 0012431 |
|
2019-11-29 09:16 |
NickH |
Status |
confirmed => closed |
2019-11-29 09:16 |
NickH |
Resolution |
open => suspended |
Issue History |
SYSTEM WARNING: 'file_get_contents(https://www.clearos.com/?rendertype=json&get=footer): failed to open stream: Connection refused' in '/var/www/virtual/newwrapper/cf_footer.inc' line 7
Copyright © 2009- ClearCenter Ltd.