HTTP Form Authentication
Back in September I wrote an post on Double Authentication in which I noted that I would elaborate on the HTTP Form Authentication method menu option at a later date. This post gives an overview of...
View ArticleDirectAccess: A VPN, but Not
courtesy of photoxpress.com Windows NT 4.0 included an implementation of the Point to Point Tunneling Protocol (PPTP) for both the NT4 Workstation and NT4 Server products, with a client for Windows 95...
View ArticleAnyConnect® Secure Mobility Client version 3.0, a Product for the Future
This week’s post came at the (unknown to him!) encouragement from another Cisco instructor who mentioned that this product was available for download from Cisco Connection Online (CCO). The phrase in...
View ArticleVPN Failover and the new Global Knowledge ASA Essentials Class
This post is the first in a three-part series that highlights some of the topics covered in the new Global Knowledge ASA Essentials class, an offering intended to provide the student the key areas of...
View ArticleVPN Single Sign On and the new Global Knowledge ASA Essentials Class
This article is the last in a three-part series that highlights some of the topics covered in the new Global Knowledge ASA Essentials class, an offering intended to provide the student key areas of...
View ArticleXAUTH Hybrid Mode – Dissected
Within a few years after Cisco acquired the original VPN Concentrator from Altiga Networks, a noted improvement was made in the way IPSec remote access VPN clients initiated connections. This...
View ArticleDatagram Transport Layer Service — DTLS
This week’s post highlights some of the features and implementation specifics regarding the Datagram Transport Layer Service (DTLS) protocol used in Virtual Private Networks with the Cisco AnyConnect®...
View ArticleAdvantages of Using Dell SonicWALL Route-Based VPN Instead of Site-to-Site VPN
There are several advantages to implementing a route-based VPN (a.k.a. tunnel interface VPN) instead of a site-to-site one. While both establish a secure tunnel between appliances, a route policy...
View Article8 Steps to Smarter Smartphone Use
If you have a smartphone, you have a fully capable computer in your pocket that has an always-on connection to the Internet that is tracking your every move. A bit scary, right? Here are eight steps...
View ArticleChallenges for NaaS Adoption
It’s important to recognize that the virtual overlay form of Network-as-a-Service (NaaS) only segments the connectivity that the real network underneath provides. In other words, an application’s...
View ArticleUsing Cisco Tunnel Control Protocol – IPSec VPNs
A relatively new feature on the Cisco Router IOS® (introduced in version 12.4(9)T) finally supports NAT transparency with IPSec VPNs using Tunnel Control Protocol (TCP). This option has long been...
View Article8 Steps to Smarter Smartphone Use
If you have a smartphone, you have a fully capable computer in your pocket that has an always-on connection to the Internet that is tracking your every move. A bit scary, right? Here are eight steps...
View ArticleChallenges for NaaS Adoption
It’s important to recognize that the virtual overlay form of Network-as-a-Service (NaaS) only segments the connectivity that the real network underneath provides. In other words, an application’s...
View Article
More Pages to Explore .....