- CheckMates
- :
- Products
- :
- Quantum
- :
- Remote Access VPN
- :
- Endpoint security encryption used E87.50
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Endpoint security encryption used E87.50
Re We are using E87.50 right now. My understanding is that if the fat client (E87.50)can't get out on certain ports it will use sslvpn (443) to get out, but if it can get out on ports ____ - not sure what they are it will use an IPSEC vpn tunnel with encyrption based on Global Properties - Remote Access - VPN authentication and encryption - Encryption algorithms - Edit
The cipher suites used if it goes the sslvpn route can be seen with cipher_uitl.
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Are you asking a question?
For the initial connection, HTTPS is used.
If the client can use IKE (UDP 500) and NAT-T (UDP 4500), they will be used, else Visitor Mode (on HTTPS) will be used.
This applies to all VPN clients except for SNX (which uses Visitor Mode by design).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Are you asking a question?
For the initial connection, HTTPS is used.
If the client can use IKE (UDP 500) and NAT-T (UDP 4500), they will be used, else Visitor Mode (on HTTPS) will be used.
This applies to all VPN clients except for SNX (which uses Visitor Mode by design).
