Hi Paul

Irrespective of whether you use HTTP or HTTPS, there are temporary files
stored in your PC. With respect to SSL, the cookies used for the SSL
connection are
saved in the temp files folder.

A Security Analyst can give a more technical question for your question.


Hope you know Cisco Secure Desktop which is specifically developed by Cisco
for it's WebVPN feature to address the issue what the customer has asked
for?

Hence for an official answer, you can checkout for the Cisco CSD docs and
get the answer.

The highlighted portion given below should be answer your question

Snippet from
http://cisco-images.cisco.com/en/US/docs/security/csd/csd342/release/notes/csdrn342.html#wp43629

*Secure Desktop (Vault)* encrypts the data and files associated with or
downloaded during a remote session into a secure partition, and presents a
graphical representation of a desktop that includes an image of a lock to
signify a safe environment for the remote user to work in. When the remote
session ends, a sanitation algorithm wipes the encrypted partition.
Typically used during clientless SSL VPN sessions, Secure Desktop attempts
to reduce the possibility that cookies, browser history, temporary files,
and downloaded content remain after a remote user logs out, the session
times out, or after an abrupt termination occurs.

•*Cache Cleaner*, an alternative to Secure Desktop, attempts to eliminate
information in the browser cache at the end of a session. This information
includes entered passwords, auto-completed text, files cached by the
browser, and browser configuration changes



With regards
Kings

On Thu, Nov 4, 2010 at 7:09 PM, Paul Tribe <[email protected]> wrote:

>  I understand how SSL functions however I have a question that a customer
> asked and want to provide an official answer:
>
>
>
> *"If I go into an Internet Cafe and access my SSL VPN portal, what
> information about my transactions could be left on the Cafe PC"*
>
>
>
> In essence, other than the obvious risks such as downloading a file to the
> Cafe PC and leaving it or not logging out of your session, the question is
> what security footprint is left behind when accessing a SSL VPN portal from
> a general public resource such as an Internet Cafe PC. If anyone knows of an
> official documentation on this please let me know and point me to it.
>
>
>
> Paul
>
> Confidentiality Statement
>
> This email (and any attachment) is confidential and may be legally
> privileged. It is intended solely for the use of the individual or entity to
> whom it is addressed. If you received this message in error please tell us
> by reply (or telephone the sender) and delete all copies on your system. Any
> review, dissemination, distribution, copying or other use of this
> communication or the information in it is strictly prohibited. The sender
> does not accept liability for any errors or omissions
>
> Whilst Nowcomm have taken reasonable precautions to ensure that any
> attachments to this email has been swept for viruses, we cannot accept
> liability for any damage sustained as a result of software viruses and would
> advise that you carry out your own virus checks before opening any
> attachment.
>
> HELP THE ENVIRONMENT - THINK BEFORE YOU PRINT! Do you really need to print
> a copy of this email? If you do need to print remember to consider economy
> printer settings.
>
> _______________________________________________
> For more information regarding industry leading CCIE Lab training, please
> visit www.ipexpert.com
>
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to