<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to incorporate TPM (Trusted Platform Module) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-incorporate-tpm-trusted-platform-module/m-p/1198637#M877073</link>
    <description>&lt;P&gt;Have any of you ever used TPM to secure a VPN connection into a corporate network?  I'm interested in doing two factor authentication.  Ideally, only laptops that I authorize will have access to the VPN tunnel.  If the laptop were to be lost or stolen I'd like to have the ability to disallow its connection by revoking a cert for example.  What are your thoughts on this and what steps have you taken to get this implemented?  The firewall is an ASA5510.  Thanks!&lt;/P&gt;</description>
    <pubDate>Tue, 26 Mar 2019 00:42:00 GMT</pubDate>
    <dc:creator>Matthew Ratliff</dc:creator>
    <dc:date>2019-03-26T00:42:00Z</dc:date>
    <item>
      <title>How to incorporate TPM (Trusted Platform Module)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-incorporate-tpm-trusted-platform-module/m-p/1198637#M877073</link>
      <description>&lt;P&gt;Have any of you ever used TPM to secure a VPN connection into a corporate network?  I'm interested in doing two factor authentication.  Ideally, only laptops that I authorize will have access to the VPN tunnel.  If the laptop were to be lost or stolen I'd like to have the ability to disallow its connection by revoking a cert for example.  What are your thoughts on this and what steps have you taken to get this implemented?  The firewall is an ASA5510.  Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:42:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-incorporate-tpm-trusted-platform-module/m-p/1198637#M877073</guid>
      <dc:creator>Matthew Ratliff</dc:creator>
      <dc:date>2019-03-26T00:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to incorporate TPM (Trusted Platform Module)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-incorporate-tpm-trusted-platform-module/m-p/1198638#M877078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a difference between trusting a user (after passing strong user authentication) and trusting that user's computer. While the former has traditionally been emphasized, only recently has the latter been given sufficient attention (see Trusted Platform Module - TPM). As discussed earlier, a Trojan-laden computer defeats strong user authentication. But a â&amp;#128;&amp;#156;company computerâ&amp;#128;&amp;#157;, which is typically supported and managed according to corporate security policies, typically deserves more trust than a â&amp;#128;&amp;#156;non-company computerâ&amp;#128;&amp;#157;. A secure SSL VPN infrastructure should allow you to verify a remote host's identity by checking on predefined end device parameters. Examples include registry entries, special files in a specified location, or digital certificates (as a form of device authentication). The host identity information can be used to make your access permission decisions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Feb 2009 19:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-incorporate-tpm-trusted-platform-module/m-p/1198638#M877078</guid>
      <dc:creator>didyap</dc:creator>
      <dc:date>2009-02-04T19:53:55Z</dc:date>
    </item>
  </channel>
</rss>

