Quantcast
Channel: vpn – Global Knowledge Blog
Browsing all 13 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

HTTP Form Authentication

Back in September I wrote an post on Double Authentication in which I noted that I would elaborate on the HTTP Form Authentication method menu option at a later date. This post gives an overview of...

View Article



Image may be NSFW.
Clik here to view.

DirectAccess: A VPN, but Not

courtesy of photoxpress.com Windows NT 4.0 included an implementation of the Point to Point Tunneling Protocol (PPTP) for both the NT4 Workstation and NT4 Server products, with a client for Windows 95...

View Article

Image may be NSFW.
Clik here to view.

AnyConnect® Secure Mobility Client version 3.0, a Product for the Future

This week’s post came at the (unknown to him!) encouragement from another Cisco instructor who mentioned that this product was available for download from Cisco Connection Online (CCO). The phrase in...

View Article

Image may be NSFW.
Clik here to view.

VPN Failover and the new Global Knowledge ASA Essentials Class

This post is the first in a three-part series that highlights some of the topics covered in the new Global Knowledge ASA Essentials class, an offering intended to provide the student the key areas of...

View Article

Image may be NSFW.
Clik here to view.

VPN Single Sign On and the new Global Knowledge ASA Essentials Class

This article is the last in a three-part series that highlights some of the topics covered in the new Global Knowledge ASA Essentials class, an offering intended to provide the student key areas of...

View Article


Image may be NSFW.
Clik here to view.

XAUTH Hybrid Mode – Dissected

Within a few years after Cisco acquired the original VPN Concentrator from Altiga Networks, a noted improvement was made in the way IPSec remote access VPN clients initiated connections. This...

View Article

Image may be NSFW.
Clik here to view.

Datagram Transport Layer Service — DTLS

This week’s post highlights some of the features and implementation specifics regarding the Datagram Transport Layer Service (DTLS) protocol used in Virtual Private Networks with the Cisco AnyConnect®...

View Article

Image may be NSFW.
Clik here to view.

Advantages of Using Dell SonicWALL Route-Based VPN Instead of Site-to-Site VPN

There are several advantages to implementing a route-based VPN (a.k.a. tunnel interface VPN) instead of a site-to-site one. While both establish a secure tunnel between appliances, a route policy...

View Article


Image may be NSFW.
Clik here to view.

8 Steps to Smarter Smartphone Use

If you have a smartphone, you have a fully capable computer in your pocket that has an always-on connection to the Internet that is tracking your every move. A bit scary, right? Here are eight steps...

View Article


Image may be NSFW.
Clik here to view.

Challenges for NaaS Adoption

It’s important to recognize that the virtual overlay form of Network-as-a-Service (NaaS) only segments the connectivity that the real network underneath provides. In other words, an application’s...

View Article

Image may be NSFW.
Clik here to view.

Using Cisco Tunnel Control Protocol – IPSec VPNs

A relatively new feature on the Cisco Router IOS® (introduced in version 12.4(9)T) finally supports NAT transparency with IPSec VPNs using Tunnel Control Protocol (TCP). This option has long been...

View Article

Image may be NSFW.
Clik here to view.

8 Steps to Smarter Smartphone Use

If you have a smartphone, you have a fully capable computer in your pocket that has an always-on connection to the Internet that is tracking your every move. A bit scary, right? Here are eight steps...

View Article

Image may be NSFW.
Clik here to view.

Challenges for NaaS Adoption

It’s important to recognize that the virtual overlay form of Network-as-a-Service (NaaS) only segments the connectivity that the real network underneath provides. In other words, an application’s...

View Article

Browsing all 13 articles
Browse latest View live




Latest Images