After completing this chapter, you will be able to perform the following tasks:
Understand the firewall feature of the VPN Client
Configure the Are You There option
Create a customized firewall policy for the Cisco integrated firewall client
The last two chapters looked at configuring the Cisco VPN Client for remote access. This chapter looks at a very important feature of the VPN Software Client—a client-installed software firewall that protects the device that is connected to the VPN. For example, if you give remote workers VPN access, you cannot control from where they access your network over the VPN. If they connect their laptop to a third-party network, it is at risk from other network users. ...