dynamik wrote: Although it was a VM, you still connected an unauthorized machine to your companies network. That's probably against their security policy. Even if you didn't configure NAT, when your bridge your connections (which is what it sounds like what you did with the MyISP connection), you're on the network. If it receives a DHCP address or if you can do anything else (i.e. visit websites) it's on the network. I'm not following how you think someone else could have access the network though. While I agree that you shouldn't experiment with things on a live network, I don't see how a security breach could have occurred.
Dracula28 wrote: Yes you are correct, and its a stupid thing to do. The reason I ask for the security breach is because of the NAT/router I set up on that virtual machine. Wouldn't a NAT allow someone into a network? I'm not quite sure how NAT works yet though, thats why I'm worried. It was a stupid thing to do, which I realised, and therefore disabled the network connection within minutes. But yet the NAT server did receive some and reject some packets, thats why I'm worried.
Dracula28 wrote: About the host machine protecting the VMs, even if the actual VMs are not protected, the host would still not send any traffic on to the network the host is connected to, due to the firewall on the host, right? What I mean is, if someone gain access to your test enviroment (which is rarely protected), they would still not be able to go through your vms and host machine, and get into the network the host is connected to?