BYOD, Mobility, and Remote Access VPN – How Can I Troubleshoot All These Technologies and Solutions?

June 8, 2012 - 0 Comments

Mobility enables the extension of IT resources and application availability to anytime, anyplace, any way. Initially people thought that the “mobility movement” was just hype; however, it is definitely a reality, as it has become ubiquitous with efficiency. All of these new devices and social applications are bringing potential security risks to the enterprise and public sector organizations. The threat landscape ranges from potential data leakage to lost and stolen devices that may contain corporate and private information.

The question now is how can we address the customers’ challenge of enhancing productivity without compromising network security. Cisco’s AnyConnect Secure Mobility Client and the Cisco ASA 5500 Series Adaptive Security Appliances enable desktop and mobile users to connect to the corporate network, giving access to the network from any device based on comprehensive secure access policies. Cisco AnyConnect Secure Mobility Client works in conjunction with Cisco’s IronPort Web security appliance, the Cisco ASA appliance, and also provides integration with ScanSafe, an in-the-cloud Web security solution.

Supporting new devices costs money and limited IT resources are sometimes taxed even further trying to provide that support. Often times new skills will be needed to maintain these devices on an ongoing basis. It is very important for network security professionals to learn effective techniques on how to maintain and troubleshoot these types of remote and mobile connections.

I invite you to attend Cisco Live 2012 and join me in the session titled “Troubleshooting Remote Access SSL VPN and Secure Mobility” (BRKSEC-3050). This session provides techniques for troubleshooting Clientless SSL VPN and Cisco AnyConnect Secure Mobility Client connections on the Cisco ASA 5500 Series Adaptive Security Appliances. AnyConnect provides end users with a connectivity experience that is intelligent, seamless, and always-on, with secure mobility across today’s proliferating managed and unmanaged mobile devices. In this session, you will learn numerous tips and best practices when troubleshooting problems related to SSL VPN and Secure Mobility. This session is designed for networking and security professionals who have deployed or are planning to deploy remote access SSL VPN solutions.

Additionally, you may also join me and take advantage of a full-day 8-hour advanced lab titled “Deploying and Troubleshooting SSL VPN” (LTRSEC-2010). This session provides four (4) hours of lecture and four (4) hours of practice labs that cover topics in an easy to follow, goal-oriented step-by-step approach. In the lab, students will learn different deployment scenarios and several troubleshooting techniques, tips, and methodologies that will help them in real world scenarios on the Cisco ASA. The lecture and the lab provide attendees with an opportunity to learn about various deployment modes and glues together many different components, such as secure mobility and Dynamic Access Policies (DAP). The Cisco ASA supports IPv6 for remote access VPN, as the transition from IPv4 is gaining momentum. In this session, students will learn the configuration and troubleshooting of remote access VPN IPv6 implementations. Attendees will be able to configure, verify, and troubleshoot configuration and network operations using recommended techniques and commands.

If you are unable to attend the 8-hour lab/session, you can also join my colleagues and me and take any of the following “walk-in” labs at the World of Solutions:

  • Cisco AnyConnect SSL VPN – LABSEC-1185
  • Cisco Clientless SSL VPN – LABSEC-1186
  • IPv6 AnyConnect SSL VPN – LABSEC-3400

These labs provide attendees with a unique opportunity to get hands-on experience on these technologies and solutions. These labs are designed to give a full experience by not only allowing attendees to work through a 45-60 minute pre-designed scenario, but also by allowing you to explore full configurations and troubleshooting scenarios. Hope to see you in San Diego next week!

In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.