I have one question for all of you... I'd REALLY appreciate an answer to this one....
I am writing a proposal on an implementation of a client VPN scenario on a PIX 525. My client is going to provide client VPN access to certain of it's partners in the world. Each partner will have their own...
alright people, I REALY need some advice on this one.. Here is the scenario.
We have external partners that are connecting to a web site sitting in the DMZ. There is a local authentication that happens on the web site (using some sort of database for validation). Once the user is authenticated...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.