I need a very cheap VPN solution for a small business. The company has about 20 employees, and about 5 or 6 of them will need remote access through VPN.
Another requirement is that it be an application-based VPN, such as an SSL. You know, you open a web browser, enter an IP address and gain access to a secure (https) web page, where one would enter their log-on credentials.
They dont want a network-based VPN solution, which would require a VPN client to be running on the remote computer.
What they have now is a typical small business set up: a Linksys wireless router uplinked to a cable modem which is connected to the ISP.
I am familiar with GoToMyPC. Its OK, but not quite wat I am looking for.
I am looking for the equivalent of a network-based VPN solution - in terms of functionality -- but SSL-based so that a clien tis not necessary.
So, with network VPN, a client establishes a session with a concentrator, which terminates the VPN, then the client is authenticated, and then assigned a local IP address from the LAN pool.
I want all that functionality, but in the form of SSL. So, what I em envisioning is opening a browser, entering an IP address of the SSL appliances that will terminate the connection, then get authenticated and assigned an address. Hopefully, I can get the SSL appliance to do local authnetication and local DHCP services, because the company does not own separate aaa or AD servers, nor do they have a DHCP server.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...