Hi Paul Irrespective of whether you use HTTP or HTTPS, there are temporary files stored in your PC. With respect to SSL, the cookies used for the SSL connection are saved in the temp files folder.
A Security Analyst can give a more technical question for your question. Hope you know Cisco Secure Desktop which is specifically developed by Cisco for it's WebVPN feature to address the issue what the customer has asked for? Hence for an official answer, you can checkout for the Cisco CSD docs and get the answer. The highlighted portion given below should be answer your question Snippet from http://cisco-images.cisco.com/en/US/docs/security/csd/csd342/release/notes/csdrn342.html#wp43629 *Secure Desktop (Vault)* encrypts the data and files associated with or downloaded during a remote session into a secure partition, and presents a graphical representation of a desktop that includes an image of a lock to signify a safe environment for the remote user to work in. When the remote session ends, a sanitation algorithm wipes the encrypted partition. Typically used during clientless SSL VPN sessions, Secure Desktop attempts to reduce the possibility that cookies, browser history, temporary files, and downloaded content remain after a remote user logs out, the session times out, or after an abrupt termination occurs. •*Cache Cleaner*, an alternative to Secure Desktop, attempts to eliminate information in the browser cache at the end of a session. This information includes entered passwords, auto-completed text, files cached by the browser, and browser configuration changes With regards Kings On Thu, Nov 4, 2010 at 7:09 PM, Paul Tribe <[email protected]> wrote: > I understand how SSL functions however I have a question that a customer > asked and want to provide an official answer: > > > > *"If I go into an Internet Cafe and access my SSL VPN portal, what > information about my transactions could be left on the Cafe PC"* > > > > In essence, other than the obvious risks such as downloading a file to the > Cafe PC and leaving it or not logging out of your session, the question is > what security footprint is left behind when accessing a SSL VPN portal from > a general public resource such as an Internet Cafe PC. If anyone knows of an > official documentation on this please let me know and point me to it. > > > > Paul > > Confidentiality Statement > > This email (and any attachment) is confidential and may be legally > privileged. It is intended solely for the use of the individual or entity to > whom it is addressed. If you received this message in error please tell us > by reply (or telephone the sender) and delete all copies on your system. Any > review, dissemination, distribution, copying or other use of this > communication or the information in it is strictly prohibited. The sender > does not accept liability for any errors or omissions > > Whilst Nowcomm have taken reasonable precautions to ensure that any > attachments to this email has been swept for viruses, we cannot accept > liability for any damage sustained as a result of software viruses and would > advise that you carry out your own virus checks before opening any > attachment. > > HELP THE ENVIRONMENT - THINK BEFORE YOU PRINT! Do you really need to print > a copy of this email? If you do need to print remember to consider economy > printer settings. > > _______________________________________________ > For more information regarding industry leading CCIE Lab training, please > visit www.ipexpert.com > >
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com
