![]() ![]() Authorization is thereby granted by signing a certificate with the CA’s private key. This CA is normally an internal one dedicated for this usage. The server is configured to authenticate and authorize clients based on a client certificate, which must be issued by a certain certification authority (CA).So a basic (simplified) scenario looks like this: MikroTik’s Routerboards on the other hand are quite cheap and are providing a neat “black box” appliance which can easily handed to people with no IT experience. I like using OpenVPN because it is simple to configure and supports both, L2 (tap) and 元 (tun) secure (encrypted) tunnels. I use MikroTik Routerborads quite a lot on remote sites to establish a secure tunnel to connect to internal services remotely (for example for employee time clocks).
0 Comments
Leave a Reply. |