On Aug 27, 2008, at 14:42, Mark Smith wrote:
Only permitting inbound authenticated tunneling protocols like IPsec, l2tp or pptp would easily defeat that.
IPsec is not necessarily authenticated. -- james woodyatt <jhw@apple.com> member of technical staff, communications engineering