Take a look at this client starting and stopping his tunnel numerous times.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6ACVIgHHonpI9mt2muUxPI87moUC5M8dSZQGqHkJN-JwNThqdI3eRuPqYK82dyxq1RBp7CqzYz-awhNCSM722ADugZhpOSt-V-DnRi_xjVjCHH7JTUo8vQAYsY0Ak2YcGdb20zq4iRjw/s640/f5vpn_releaseaddr.png)
Each new "start" does NOT challenge the user to establish a new session from the APM policy standpoint.
So keep this is in-mind you have ClientSides checks and the users machine is no longer in policy you could open up a door into your systems with out of compliance hosts.
In this APM policy we have the CSC "continuous" checks disable due to other issues we found.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxV5GHjaHyQFKwyDIQo4QZXRCM_exRsK9RLxJ6irP7nhMDo_txSF4On3bO2YX7l7n4YGNaXsZ2avLAjahOOlIktmKqYD7HIoWRopSazIf7yGT66PkI6wWXZret9u9LQ3lJ3BuXKKs2CP0/s320/Screen+Shot+2017-04-26+at+11.49.29+AM.png)
SO I'm not 100% sure if this would be a major issues to be concern with if you have continuous hosts checks enabled.
Ken
NSE ( network security expert) and Route/Switching Engineer
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( @ @ )=
o
/ \
No comments:
Post a Comment