ASKER
ASKER
Networking software modules are interfaced with a framework implemented on the machine's operating system that implements the networking functionality of the operating system. The best known frameworks are the TCP/IP model and the OSI model. Systems typically do not use a single protocol to handle a transmission. Instead they use a set of cooperating protocols, sometimes called a protocol family or protocol suite.[9] Some of the best known protocol suites include: IPX/SPX, X.25, AX.25, AppleTalk and TCP/IP. Other protocols indirectly related to networking include the hypertext transfer protocol (HTTP) and its related technologies, Dynamic Host Configuration Protocol (DHCP), Domain Name Server (DNS) and other Internet protocols.
TRUSTED BY
However that in no way grants you access to anything. All you did when you authenticated is be granted the permissions to establish the VPN Tunnel itself,...but nothing beyond that.
Everything from that point forward depends, and is entirely controlled by,...Access Rules. Having Access to Ping does not give you access to SQL,..and having access to SQL does not give you the ability to Ping. So using Ping to test anything is pointless and the only thing it ever would really test is if you had access to Ping.
So your Access Rule would be something like:
From: VPN Clients Network
To: (Either Internal or Computer Sets, or Address Sets, or <well you should get the point>)
Protocols: <List of Protocols>
Users: (Either "All Users" for anonymous, or use specific User Sets)
I do not recommend Anonymous ("All Users")