Cisco SSL VPN – Jeremy Cioara

Home > Blogs > Cisco > Cisco SSL VPN – Jeremy Cioara

Cisco SSL VPN – Jeremy Cioara

Like This Blog 0 Jeremy Cioara
Added by December 13, 2006

SSL VPNs are the future of VPN technology. While they are still brand new, "bleeding edge" sort of technology, they will eventually be how we run our VPN connections for most organizations. The concept is simple: HTTPS (SSL-based) web pages have used adequate encryption for years…why not harness the technology to create a "client-less VPN system," tunneling applications through the SSL connection.

For a user to connect to a SSL VPN, no client installation is necessary. Rather, they simply access a web page, authenticate, and minimize the web browser window. They're now on the corporate VPN.

There's more to it than this (such as JAVA client downloads may be necessary for full port forwarding capabilities, etc…). Cisco just published an excellent explanation / configuration document for the WebVPN/SSL VPN technology. Get it here.

Videos You May Like

Creating Users and Managing Passwords in Microsoft Office 365

0 696 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

Windows 10 Managing, Deploying and Configuring – December 2, 2015

0 444 1

In this recorded Windows 10 training webinar from December 2, 2015, Windows Server instructor Rick Trader presents the deployment and management of Windows 10 Enterprise and the new Provisioning capability in Windows 10. Learn how to manage Windows 10 deployments using System Center Configuration Manager, Mobile Device Management and Intune. Also included in his presentation … Continue reading Windows 10 Managing, Deploying and Configuring – December 2, 2015

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 647 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.