Deploying SSL VPNs (WebVPN) on the ASA 5500

Table of contents:

Review Questions


How many versions of SSL are there, and which can be implemented on Cisco equipment?


What are some of the main advantages and disadvantages of SSL remote access VPNs?


What type of protocol is SSL transported over?


What protocols does SSL consist of?


What are the functions of the record protocol?


What software is required on client workstations for port forwarding to function?


What types of applications can be used with port forwarding?


What is SSL VPN e-mail proxy?


How is the Cisco SSL VPN Client installed on remote access users' workstations?


How does the Cisco Secure Desktop assess the location of a remote access user's workstation?

Part I: Understanding VPN Technology

What Is a Virtual Private Network?

Part II: Site-to-Site VPNs

Designing and Deploying L2TPv3-Based Layer 2 VPNs

Designing and Implementing AToM-Based Layer 2 VPNs

Designing MPLS Layer 3 Site-to-Site VPNs

Advanced MPLS Layer 3 VPN Deployment Considerations

Deploying Site-to-Site IPsec VPNs

Scaling and Optimizing IPsec VPNs

Part III: Remote Access VPNs

Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs

Designing and Deploying IPsec Remote Access and Teleworker VPNs

Designing and Building SSL Remote Access VPNs (WebVPN)

Part IV: Appendixes

Designing and Building SSL Remote Access VPNs (WebVPN)

Appendix B. Answers to Review Questions

Comparing, Designing, and Deploying VPHs
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors: Mark Lewis © 2008-2020.
If you may any questions please contact us: