O'Reilly logo

SSL VPN by Joseph Steinberg, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Tunneling to the Other Side

Another option for legacy access is by SSL VPN tunneling. The remote access methods described above meet the access needs of most remote users. Some users, however, may require client/server application access. In this case, a local client is installed on the user's PC and a remote server provides the services. Examples include CRM, e-mail, and custom applications. This can be provided by means of SSL tunneling technology as described in Chapter 3.

Tunneling Techniques

One example of this tunneling is implemented by the SSL VPN device using a built-in screen-scraping protocol that splits the emulation and display processing so that only the application's display is sent to the remote user's web browser.

In another technique, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required