Good info, bad text style in the video (Keep it standard)
@aaronmcmahan90763 ай бұрын
I believe Step 5, which says the shared secret key is encrypted with the public key and sent to the far end, isn't quite accurate. The two endpoints exchange some data (public key(s) and large prime number) and do maths. The mathematical process results in both endpoints generating the same shared key value locally and independently. Ultimately, they end up with a matching shared secret key, never sent across the wire. (Diffe Hellman)
@0812sonu2 жыл бұрын
Awesome, all info in one place.
@chinhngotung7428 Жыл бұрын
how to know who access clientless ssl on cisco asa
@BALASRB Жыл бұрын
good
@fahadbawazir17712 жыл бұрын
Good, but make complete VPN VIDEO, of ISP INTERNET SERVICE PROVIDER