Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Burlington, MA :Syngress,
    UID:
    almahu_9949697554202882
    Format: 1 online resource (609 p.)
    Edition: 1st edition
    ISBN: 1-281-11268-2 , 9786611112684 , 0-08-055663-9
    Content: Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.* Complete coverage of the Juniper Networks Secure Access SSL VPN
    Note: Includes index. , Front Cover; Juniper(r) Networks Secure Access SSL VPN Configuration Guide; Copyright Page; Technical Editor and Contributing Author; Contents; Introduction; Chapter 1 : Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Physical Security; Back to Basics: Transmission Control Protocol/Internet Protocol; TCP/IP Header; Firewall Types; Application Proxy; Pros; Cons; Gateway; Packet Filters; Stateful Inspection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2 : Setup; Introduction; Initial CLI Setup; IVE Console Setup; Initial Web Setup , Accessing the IVE through the WebUIConfiguring Date and Time; Configuring Licensing on the IVE; Network Settings in the AdminUI; Certificates; Generating a CSR; Other Certificates; Security and System Settings; Security Settings; System Options; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3 : Realms, Roles, and Resources; Introducing Realms, Roles, and Resources; Configuring Realms; Selecting and Configuring General Settings; Selecting and Configuring Authentication Policies; Selecting and Configuring Role Mapping; Optimizing User Attributes; Admin Realms , Configuring RolesUser Roles; General Settings; Standard Options; Meeting Options; Admin Roles; Configuring Resources; Introducing Resource Profiles; Introducing Resource Policies; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4 : Authentication Servers; Introduction; Local Authentication; LDAP; NIS; ACE; Radius; AD/NT; Anonymous; SiteMinder; Certificate; SAML; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5 : Secure Application Manager; Introduction; Why Use SAM?; Feature Availability; Chapter Overview; Secure Application Manager; SAM Versions , How to Deploy the SAM Applet to Connecting Computers?Secure Application Manager Implementation; Enabling SAM and Configuring Role Options; Configuring SAM on a Role; Configuring SAM Resource Policies; Configuring SAM Resource Profiles; Secure Application Manager User Experience; Troubleshooting; Secure Application Manager Troubleshooting; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6 : Terminal Services and Citrix; Introduction; Why Use the Juniper Citrix Terminal Services Proxy?; Feature Availability; Chapter Overview; Terminal Services , Terminal Services ImplementationConfiguring Terminal Services Resource Policies; Configuring Terminal Services Resource Profiles; Configuring Terminal Services and Citrix Using a Hosted Java Applet; Terminal Services User Experience; Citrix; Citrix Client Types; Citrix Implementation; Citrix User Experience; Launching Terminal Services Sessions and Java Applets from an External Site; Terminal Services and Citrix Troubleshooting; IVE-Side Troubleshooting; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7 : Network Connect; Introduction; Why Use Network Connect? , Feature Availability , English
    Additional Edition: ISBN 1-59749-200-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages