-
- [ ] Come up with a formal description of what is allowed and what is not
- [ ] Create protocols and procedures for requesting VPN access
- Make sure they understand what is allowed and what is not…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…
-
```
What steps will reproduce the problem?
1. Open iphonebrowser
2. Requesting internet access
3. Accepting... (for now)
What is the expected output? What do you see instead?
What I want to know is…