I totally disagree. Not being able to sniff the traffic is the benefit that it adds.Tunnel all offers no added benefit
That's true, but if your tunnel all allows no access to the internet, then, at least the traffic can't be sniffed real time. (and not at all if the remote computer isn't allowed normal internet access ever.) I know corps who do just that, and it's necessary as they're dealing with sensitive info.The traffic destin for the Corp Lan is encapsulated in the tunnel and is not sniffable unless the computer itself is compromised (which is true for tunnel all at that point).
ISO isn't one of my concerns -- yet. Just the normal paranoia of seeing a lot of what happens on the internet that normal people don't see. Like there's *always* traffic from the script kiddies trying to beak into your network, and keeping your internal network behind a VPN gets rid of most of that.I would love to be able to explain my point better, but it's been a while since I had to bust out the theory books. Either way if you need to be ISO compliant...they force you to tunnel all. So you win by default LOL.
I am unclear about the split tunnel thing as it would apply to me. Connections really aren't a problem in my current setup, too small a shop. Allowing a split tunnel is allowing traffic on the remote side my stuff wont see, and that's a problem because those same script kiddies are scanning the remote side too and taking up bandwidth doing it.
Interesting discussion, btw!