Does anybody knows if Cisco is planning to releas a Clientless VPN solution for their VPN concentrator series devices. Vendors like checkpoint have already done that and I was wondering what is Cisco doing about it.
i am trying to show my boss the difference between a PIX solution and a Citrix Metaframe solution. We have already made an investment in Metaframe so to support some remote users but we have more coming. So the question is whether we expand it or go with a PIX.
I've never used a vpn product before so i don't understand what it looks like from both the user and support/administration.
i see from the articles from the above link that SSL isn't as 'strong'. One author asserts "There are more opportunities for outside attack, the crypto is not as robust and the authentication is not as strong"
well, compared to the nothing we have now, anything is better. Doe Cisco have something that does a comparison?
It really depends on what you are trying to accomplish. A pix is not a replacement for Citrix. From the VPN standpoint it is a means to connect outside devices securely to the network. It would depend on what the user is trying to get to, and how sensitive the data is as to whether it is worth tossing the citrix out of the equation.
But remember there are insecure(or should I say "less secure") ways to setup the pix VPN as well;-)
Clientless VPN" technology is catching on as the term that describes products that serve as an alternative to traditional IP Security-based VPNs.
These products come into play when an IPSec-based VPN has too much overhead, has too many proprietary extensions, is too expensive or is too limiting to solve the problem at hand. Case in point: An extranet-type VPN, with hundreds or thousands of companies participating, would be almost impossible to manage using off-the-shelf IPSec technology.
Several vendors, including Aventail, Neoteris, Netilla, SafeWeb and TrueDisk, have introduced Secure Sockets Layer (SSL)-based VPN security gateways, while Check Point Software and Nortel have added SSL-based VPN service to their overall VPN products.
The key to SSL-based VPNs is a client application available on everyone's computer: the Web browser. An end user launches a Web browser and then connects, using HTTP-over-SSL, to the SSL security gateway. After the SSL gateway authenticates the user, it proxies the connection - typically using HTTP - to a Web server inside.
One common application example is Web-based e-mail, such as Outlook Web Access (OWA), the Web front end to Microsoft's popular Exchange mail system. By dropping an SSL-based VPN server in front of an OWA Web server, a network manager can add encryption, authentication and control without putting the additional load of SSL encryption directly on the OWA server.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :