Well, based on a number of emails I have received, some people were quite surprised to learn in my first blog post that poorly designed and configured IPsec VPNs are vulnerable not only to the NSA and ...
Previous articles (Part one, Part two) in this series on implementing VPN gateways using Cisco routers discussed the IPsec protocol and basic IPsec VPN connection models. Now we'll learn how to ...
I'm trying to understand how public key authentication works and with tools such as ChatGPT I'm able to resolve how it works; the server keeps a tab of "authorized" public keys and uses them to ...
In my last blog post, I recommended a number of ways to avoid the first five of my top ten reasons why IPsec VPNs fail. As promised, in this blog post, I’ll finish this particular topic by explaining ...