SSL VPN and VPN Technologies

Поділитися
Вставка
  • Опубліковано 9 лют 2025

КОМЕНТАРІ • 7

  • @0812sonu
    @0812sonu 3 роки тому +2

    Awesome, all info in one place.

  • @max_snowtr
    @max_snowtr Рік тому +1

    Thank you

  • @aaronmcmahan9076
    @aaronmcmahan9076 7 місяців тому

    I believe Step 5, which says the shared secret key is encrypted with the public key and sent to the far end, isn't quite accurate. The two endpoints exchange some data (public key(s) and large prime number) and do maths. The mathematical process results in both endpoints generating the same shared key value locally and independently. Ultimately, they end up with a matching shared secret key, never sent across the wire. (Diffe Hellman)

  • @BALASRB
    @BALASRB 2 роки тому +2

    good

  • @fahadbawazir1771
    @fahadbawazir1771 3 роки тому +2

    Good, but make complete VPN VIDEO, of ISP INTERNET SERVICE PROVIDER

  • @pratiksankhe8659
    @pratiksankhe8659 6 місяців тому

    Good info, bad text style in the video (Keep it standard)

  • @chinhngotung7428
    @chinhngotung7428 Рік тому +1

    how to know who access clientless ssl on cisco asa