Split-tunnelling? Security madness, surely?
Is enabling split tunnelling really such a good idea? Doesn't that make each user's remote laptop capable of being a router from nasty Internet to clean Corporate network?
Is enabling split tunnelling really such a good idea? Doesn't that make each user's remote laptop capable of being a router from nasty Internet to clean Corporate network?