Book description
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.- Complete coverage of the Juniper Networks Secure Access SSL VPN line including the 700, 2000, 4000, 6000, and 6000 SP.
- Learn to scale your appliances to meet the demands of remote workers and offices.
- Use the NEW coordinated threat control with Juniper Networks IDP to manage the security of your entire enterprise.
Table of contents
- Cover
- Title Page
- Copyright
- Technical Editor and Contributing Author
- Contributors
- Table of Contents
- Chapter 1: Defining a Firewall
- Chapter 2: Setup
- Chapter 3: Realms, Roles, and Resources
- Chapter 4: Authentication Servers
- Chapter 5: Secure Application Manager
- Chapter 6: Terminal Services and Citrix
- Chapter 7: Network Connect
- Chapter 8: Endpoint Security
- Chapter 9: Web/File/Telnet/SSH
- Chapter 10: Maintenance Section
- Chapter 11: System Section
- Chapter 12: Sign-in Policies
- Chapter 13: Logging
- Chapter 14: Enterprise Features
- Index
Product information
- Title: Juniper(r) Networks Secure Access SSL VPN Configuration Guide
- Author(s):
- Release date: April 2011
- Publisher(s): Syngress
- ISBN: 9780080556635
You might also like
book
SSL Remote Access VPNs
SSL Remote Access VPNs An introduction to designing and configuring SSL virtual private networks Jazib Frahim, …
book
CCNP Security VPN 642-648 Official Cert Guide, Second Edition
The official study guide helps you master all the topics on the CCNP Security VPN exam, …
book
Security without Obscurity
This book provides a no-nonsense approach for operating a public key infrastructure (PKI) system. In addition …
article
Use GitHub Copilot: Additional Tips
Using GitHub Copilot can feel like magic. The tool automatically fills out entire blocks of code--but …