Configuring Clientless SSL VPN with Cisco ASA

cisco-asa

In this lab we are going to configure a clientless SSL VPN using Cisco ASA firewall. The topology layed out here is based on the suggested lab in the official Cisco training IINS. We are going to build a clientless SSL VPN between Internet-PC and Site1 resources. We’ll configure the whole thing using the Clientless … Read more Configuring Clientless SSL VPN with Cisco ASA

Justin Bieber’s Letter On Cryptography

cryptography-enigma-machine

Security can be enforced with scalable network design and cryptography. Cryptography, and more precisely cipher suites, help achieve the three pillars of computer and network security: confidentiality, integrity and authenticity. They are also called the security Triad. Confidentiality is achieved through encryption, Integrity is achieved through hash, signatures and MAC, Authenticity is achieved through hash, … Read more Justin Bieber’s Letter On Cryptography

TrustSec: The network as Security enforcer (Cisco)

This post contains my notes on the Cisco Webcast title “The Network as Security Enforcer”. The webcast was broadcast on June 30th 2015. The network can be leveraged as an attack detector, or a security enforcer. It can be configured to watch out for threats and, if an attack occurs, it can protect itself from … Read more TrustSec: The network as Security enforcer (Cisco)