Cisco Secure Desktop (CSD) – Part 7
As I have mentioned many times before, my problem with CSD is that it just doesn’t work all of the time. The fact that it can detect my anti-virus manufacturer… Read more »
As I have mentioned many times before, my problem with CSD is that it just doesn’t work all of the time. The fact that it can detect my anti-virus manufacturer… Read more »
I’ve decided to merge parts 5 and 6 together since host scan results are used directly with dynamic access policies. In this post we’ll walk through an example of how… Read more »
Now, let’s talk about something in CSD that works fairly well, pre-login policies. Pre-login polices are evaluated prior to even showing the user the login prompt for WebVPN. Much like… Read more »
I can’t make this point any more definite. You NEED to know how subnetting works if you are going to work on networks. It’s just that simple. Sure, you can… Read more »
Today we are going to talk about what CSD installs onto the client machine. I will note here that I’m a Windows guy, so any and all of the below… Read more »
In my current role, I deal with L2L (LAN to LAN) tunnels quite frequently. They are the ‘cheap’ way to connect two locations in comparison to dedicated access circuits. The… Read more »