LDAP Authentication on SSL VPN – FortiGate

LDAP Authentication LDAP stands for Lightweight Directory Access Protocol. LDAP authentication follows the client/server model. LDAP is particularly useful at helping organizations store and access usernames and passwords within their network and across applications. LDAP as a way to store and verify basic credentials whenever users are attempting to access an LDAP directory or LDAP-enabled…

Read More

Palo Alto Site-to-Site VPNs

PAN-OS software implements IPsec VPNs as route-based tunnels, as opposed to policy-based designs. The firewall also interoperate which third-party, policy-based VPN devices: IKEv1 is the most commonly used version. IKEv2 primarily is used to meet the requirements of the Network Device Protection Profile, or NDPP, Certification, Microsoft Azure compliance, and/or Suite B support. “IKEv2 preferred…

Read More

What is OCSP and Why Does It Matter?

Before understanding the OCSP, we must know about the CRL. CRL (Certificate Revocation List) The definition lines on its name, Certificate Revocation List also you can call “blacklist of X.509 digital certificate”. It contains a list of revoked digital certificates from certificate authorities before their assigned expiration dates that should no longer be trusted. CRLs provide a method…

Read More