UID:
almahu_9949697554202882
Format:
1 online resource (609 p.)
Edition:
1st edition
ISBN:
1-281-11268-2
,
9786611112684
,
0-08-055663-9
Content:
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.* Complete coverage of the Juniper Networks Secure Access SSL VPN
Note:
Includes index.
,
Front Cover; Juniper(r) Networks Secure Access SSL VPN Configuration Guide; Copyright Page; Technical Editor and Contributing Author; Contents; Introduction; Chapter 1 : Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Physical Security; Back to Basics: Transmission Control Protocol/Internet Protocol; TCP/IP Header; Firewall Types; Application Proxy; Pros; Cons; Gateway; Packet Filters; Stateful Inspection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2 : Setup; Introduction; Initial CLI Setup; IVE Console Setup; Initial Web Setup
,
Accessing the IVE through the WebUIConfiguring Date and Time; Configuring Licensing on the IVE; Network Settings in the AdminUI; Certificates; Generating a CSR; Other Certificates; Security and System Settings; Security Settings; System Options; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3 : Realms, Roles, and Resources; Introducing Realms, Roles, and Resources; Configuring Realms; Selecting and Configuring General Settings; Selecting and Configuring Authentication Policies; Selecting and Configuring Role Mapping; Optimizing User Attributes; Admin Realms
,
Configuring RolesUser Roles; General Settings; Standard Options; Meeting Options; Admin Roles; Configuring Resources; Introducing Resource Profiles; Introducing Resource Policies; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4 : Authentication Servers; Introduction; Local Authentication; LDAP; NIS; ACE; Radius; AD/NT; Anonymous; SiteMinder; Certificate; SAML; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5 : Secure Application Manager; Introduction; Why Use SAM?; Feature Availability; Chapter Overview; Secure Application Manager; SAM Versions
,
How to Deploy the SAM Applet to Connecting Computers?Secure Application Manager Implementation; Enabling SAM and Configuring Role Options; Configuring SAM on a Role; Configuring SAM Resource Policies; Configuring SAM Resource Profiles; Secure Application Manager User Experience; Troubleshooting; Secure Application Manager Troubleshooting; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6 : Terminal Services and Citrix; Introduction; Why Use the Juniper Citrix Terminal Services Proxy?; Feature Availability; Chapter Overview; Terminal Services
,
Terminal Services ImplementationConfiguring Terminal Services Resource Policies; Configuring Terminal Services Resource Profiles; Configuring Terminal Services and Citrix Using a Hosted Java Applet; Terminal Services User Experience; Citrix; Citrix Client Types; Citrix Implementation; Citrix User Experience; Launching Terminal Services Sessions and Java Applets from an External Site; Terminal Services and Citrix Troubleshooting; IVE-Side Troubleshooting; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7 : Network Connect; Introduction; Why Use Network Connect?
,
Feature Availability
,
English
Additional Edition:
ISBN 1-59749-200-0
Language:
English