Raftul cu initiativa Book Archive


SSL Remote Access VPNs by Qiang Huang, Jazib Frahim

By Qiang Huang, Jazib Frahim

SSL distant entry VPNs


An advent to designing and configuring SSL digital inner most networks


Jazib Frahim, CCIE® No. 5459

Qiang Huang, CCIE No. 4937


Cisco® SSL VPN ideas (formerly often called Cisco WebVPN ideas) offer you a versatile and safe solution to expand networking assets to nearly any distant consumer with entry to the web and an online browser. distant entry in response to SSL VPN provides safe entry to community assets by means of constructing an encrypted tunnel around the net utilizing a broadband (cable or DSL) or ISP dialup connection.


SSL distant entry VPNs provide you with a uncomplicated operating wisdom of SSL digital inner most networks on Cisco SSL VPN-capable units. layout tips is supplied to help you in enforcing SSL VPN in latest community infrastructures. This contains analyzing current and software program to figure out whether or not they are SSL VPN able, supplying layout ideas, and guiding you on establishing the Cisco SSL VPN units. universal deployment eventualities are lined to help you in deploying an SSL VPN on your network.


SSL distant entry VPNs promises every thing you must understand to appreciate, layout, set up, configure, and troubleshoot the entire parts that make up an efficient, safe SSL VPN solution.


Jazib Frahim, CCIE® No. 5459, is at present operating as a technical chief within the around the world safety providers perform of the Cisco complicated prone for community protection. he's liable for guiding clients within the layout and implementation in their networks, with a spotlight on community protection. He holds CCIEs, one in routing and switching and the opposite in security.


Qiang Huang, CCIE No. 4937, is a product supervisor within the Cisco Campus swap procedure expertise team, concentrating on using the protection and clever providers roadmap for market-leading modular Ethernet switching systems. in the course of his time at Cisco, Qiang has performed a big position in a few expertise teams, together with the Cisco TAC safety and VPN workforce, the place he used to be accountable for trouble-shooting advanced shopper deployments in safety and VPN options. Qiang has wide wisdom of defense and VPN applied sciences and adventure in real-life shopper deployments. Qiang holds CCIE certifications in routing and switching, defense, and

ISP Dial.


  • Understand distant entry VPN applied sciences, comparable to Point-to-Point Tunneling Protocol (PPTP), net Protocol defense (IPsec), Layer 2 Forwarding (L2F), Layer 2 Tunneling (L2TP) over IPsec, and SSL VPN
  • Learn in regards to the development blocks of SSL VPN, together with cryptographic algorithms and SSL and delivery Layer protection (TLS)
  • Evaluate universal layout most sensible practices for making plans and designing an SSL VPN solution
  • Gain perception into SSL VPN performance on Cisco Adaptive safeguard equipment (ASA) and Cisco IOS® routers
  • Install and configure SSL VPNs on Cisco ASA and Cisco IOS routers
  • Manage your SSL VPN deployment utilizing Cisco safeguard Manager


This protection booklet is a part of the Cisco Press® Networking expertise sequence. defense titles from Cisco Press support networking execs safe serious facts and assets, hinder and mitigate community assaults, and construct end-to-end self-defending networks.


Category: Networking: Security

Covers: SSL VPNs


Show description

Read Online or Download SSL Remote Access VPNs PDF

Best comptia books

Internet Security Cryptographic Principles Algorithms and Protocols

Wisdom of quantity idea and summary algebra are pre-requisites for any engineer designing a safe internet-based process. besides the fact that, many of the books at the moment on hand at the topic are aimed toward practitioners who simply need to know how some of the instruments available to buy paintings and what point of defense they communicate.

CompTIA A+ 220-701 and 220-702 Cert Guide

Permit me begin by way of asserting that this day I took the 220-701, the 1st of the mandatory checks. I handed with a ranking of 775, which as top i will determine correlates to among eighty five and ninety on a a hundred element scale. My research used to be solely self-directed and consisted of utilizing 4 diversified books, the A+ video sequence from okay Alliance and examination prep software program from [.

Pro PHP Security (Pro)

Personal home page is the world’s most well-liked open resource net scripting language, put in on virtually 17 million domain names around the world (www. Hypertext Preprocessor. net/usage. php). it truly is enjoyed through novices and embraced through complex clients. This ebook deals builders an entire consultant to taking either shielding and proactive safety ways inside of their personal home page purposes.

Secure Data Management in Decentralized Systems

The study scope of database safety has extended enormously, as a result fast improvement of the worldwide inter-networked infrastructure. Databases aren't any longer stand-alone platforms which are purely available to inner clients of organisations. as an alternative, permitting selective entry from diversified defense domain names has develop into a needs to for lots of enterprise practices.

Extra resources for SSL Remote Access VPNs

Sample text

The configurations of clientless, thin client, and AnyConnect Client modes are discussed. The second half of the chapter focuses on Cisco Secure Desktop (CSD) and offers guidance in setting up CSD features. To reinforce learning, two different deployment scenarios are presented along with their configurations. Toward the end of this chapter, SSL VPN monitoring through SDM is also discussed. Chapter 7, "Management of SSL VPNs": This chapter discusses the central management of SSL VPN devices using Cisco Security Manager.

The information is provided on an "as is" basis. The authors, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc. Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized.

During the certificate validation process, VPN devices retrieve CRLs from the CDP and check whether the received certificate has been revoked. In a large-scale PKI deployment, the CRL can become large.

Download PDF sample

Rated 4.27 of 5 – based on 36 votes