thank to all that gave some useful reply (Infiltrator) :) and all of the ...totally not so useful people :) also thanks for the worry of my livelihood :)...
it is like this...
being that the sec, admin is an ignorant and lazy guy he made the policy no access and that is the easiest thing to do.. for him of course.. now they do expect me to come (if needed) in the midle of the night to type "init 6" and go back home or to do a manual ufsdump or ufsrestore and sit there ... or something like that iss 300% in-practical if a was a different kind of user ok... but it is expected for a admin to have some kind of secure remote access right?
if they did put up a secure remote access solution and i have a strong pass. is there any risk? well minimal.... well not to go on with the arguments and so on.. i know what is the risk and really if they do expect me to come to work to restart ,or sit there until some backup/restore is done (that i can do from home) well actually i don't want that retarded job :) in any case...
but im' trying to do my homework and be as' careful and protective to my self(and the company :) as possible so...
the question is open ssl vpn , is it 100% secure and undetectable? is there a footprint? can the direction that has initiated the comm be determined? can someone after auditing say, yes it is clear that you made a vpn to outside and then connected to the inside?
Do you really think it can be dangerous or you just are saying it is not a good idea? what are the risks if i set it all up correctly?
lets say i do use certificates.. i put my home ip as the only one that can connect.. come on it not a bank.. :)
someone would have to spoof the ip,mac get around the certificates, and guess my password to get in? is that reasonable to get to some... hmm part numbers? :)