Once a VPN tunnel is established to the concentrator, clients can ping/telnet/hack! the other clients connected to the same concentrator, using the secure tunnel.I'm using the CiscoVPN client, so I figured I could push policy settings to the integrat...