SSL VPN and VPN Technologies

Поделиться
HTML-код
  • Опубликовано: 6 окт 2024

Комментарии • 7

  • @aaronmcmahan9076
    @aaronmcmahan9076 3 месяца назад

    I believe Step 5, which says the shared secret key is encrypted with the public key and sent to the far end, isn't quite accurate. The two endpoints exchange some data (public key(s) and large prime number) and do maths. The mathematical process results in both endpoints generating the same shared key value locally and independently. Ultimately, they end up with a matching shared secret key, never sent across the wire. (Diffe Hellman)

  • @0812sonu
    @0812sonu 2 года назад +2

    Awesome, all info in one place.

  • @max_snowtr
    @max_snowtr Год назад +1

    Thank you

  • @fahadbawazir1771
    @fahadbawazir1771 2 года назад +2

    Good, but make complete VPN VIDEO, of ISP INTERNET SERVICE PROVIDER

  • @BALASRB
    @BALASRB Год назад +2

    good

  • @chinhngotung7428
    @chinhngotung7428 Год назад +1

    how to know who access clientless ssl on cisco asa

  • @pratiksankhe8659
    @pratiksankhe8659 2 месяца назад

    Good info, bad text style in the video (Keep it standard)