I believe Step 5, which says the shared secret key is encrypted with the public key and sent to the far end, isn't quite accurate. The two endpoints exchange some data (public key(s) and large prime number) and do maths. The mathematical process results in both endpoints generating the same shared key value locally and independently. Ultimately, they end up with a matching shared secret key, never sent across the wire. (Diffe Hellman)
Awesome, all info in one place.
Thank you
how to know who access clientless ssl on cisco asa
I believe Step 5, which says the shared secret key is encrypted with the public key and sent to the far end, isn't quite accurate. The two endpoints exchange some data (public key(s) and large prime number) and do maths. The mathematical process results in both endpoints generating the same shared key value locally and independently. Ultimately, they end up with a matching shared secret key, never sent across the wire. (Diffe Hellman)
good
Good, but make complete VPN VIDEO, of ISP INTERNET SERVICE PROVIDER
Good info, bad text style in the video (Keep it standard)