Comments
-
thank you!!! easy enough. Sincerely appreciate it.
-
Thanks for checking. Does this have anything to do with Tunnel All Mode? Shows the user under SSL/VPN status (below image), I'll keep an eye on Inactivity Time and let you know. Really need this to work for security reasons.
-
Hi BWC, the image is an old one, I attached a new one. I'm switching from L2TP to SSL/VPN. I've toggled the SSLVPN Inactivity Check box several times and it still didn't make a difference. For clarity, you're saying this needs to be checked, correct? Firmware: SonicOS Enhanced 6.5.4.9-92n
-
I just answered my own question after testing again. It's secure even when not trusted, I had this switched around in my head thinking it allowed passwords to be sent in cleartext. Note, the security alert below pops up when accessing SSL-VPN through NetExtender
-
With a self-signed cert that fails when going to https://ipaddress:4433 we know passwords are at risk sent in cleartext. Does the same risk remain present when logging in using NetExtender and the same IPaddress:4433?
-
I think the main point of my post wasn't addressed, although it's nice to clarify that a self-signed cert is as secure as one from a CA. After reading over I realize I could have worded things better. The main point I'm trying to address is I've watched plenty of how-to videos that show the cert warning, meaning logging in…
-
Figured it out, was using 443 rather than 4433.
-
Thanks, never heard of this or used it before. What type of experience does the user get, is it like VPN where they have a tunnel or an entirely different way to connect?