G
Guest
Hello,
When following article Q240262 I came across a question. If you specify the IP-Sec filters as described (i.e. exactly the same on both source and destination), this would allow only an L2TP connection to be initiated from the destination to the source machine. Mirroring of the IPSec rules only accounts for answers but, as far as I know, does not mirror the ports (i.e. if source port 1701 is allowed from machine A, the mirror rule will specify that machineA can be used as a destination for port 1701, NOT that machine A will allow all ports). Howcome that the configuration still works, even when the L2TP tunnel is set up from the other side then specified in the policy?
Thanks,
Martin
When following article Q240262 I came across a question. If you specify the IP-Sec filters as described (i.e. exactly the same on both source and destination), this would allow only an L2TP connection to be initiated from the destination to the source machine. Mirroring of the IPSec rules only accounts for answers but, as far as I know, does not mirror the ports (i.e. if source port 1701 is allowed from machine A, the mirror rule will specify that machineA can be used as a destination for port 1701, NOT that machine A will allow all ports). Howcome that the configuration still works, even when the L2TP tunnel is set up from the other side then specified in the policy?
Thanks,
Martin