![]() ![]() No way, F5 provides endpoint security? Let's check it out. OK, cool there's an article from F5.com discussing my exact use case. Others who have deployed F5 as a VPN solution have to have used a third-party solution, right? So we start with my personal favorite search method "NAC site:f5.com." Go out and find a NAC solution and by the way, there's no money!"Īt this point let's be honest, you only know what you know so you decide to go to your handy dandy search engine to identify a NAC solution. Now that you have saved your organization a ton of money by using the existing F5 BIG-IP in your data center as a VPN solution rather than investing in a yet another security appliance, leadership thinking you're a hero, your local IA shop steps in and says, "we still need a security device to apply network access controls prior to allowing access. I wanted to take this and go a bit further by adding additional security to this solution by requiring certain end point settings, services or even updates be deployed prior to allowing access to internal resources. In a previous article we discussed how to configure the BIG-IP as an SSL VPN solution which can be found here.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |