Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    Online-Ressource
    Online-Ressource
    Burlington, MA :Syngress,
    UID:
    almahu_9949697554202882
    Umfang: 1 online resource (609 p.)
    Ausgabe: 1st edition
    ISBN: 1-281-11268-2 , 9786611112684 , 0-08-055663-9
    Inhalt: Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.* Complete coverage of the Juniper Networks Secure Access SSL VPN
    Anmerkung: Includes index. , Front Cover; Juniper(r) Networks Secure Access SSL VPN Configuration Guide; Copyright Page; Technical Editor and Contributing Author; Contents; Introduction; Chapter 1 : Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Physical Security; Back to Basics: Transmission Control Protocol/Internet Protocol; TCP/IP Header; Firewall Types; Application Proxy; Pros; Cons; Gateway; Packet Filters; Stateful Inspection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2 : Setup; Introduction; Initial CLI Setup; IVE Console Setup; Initial Web Setup , Accessing the IVE through the WebUIConfiguring Date and Time; Configuring Licensing on the IVE; Network Settings in the AdminUI; Certificates; Generating a CSR; Other Certificates; Security and System Settings; Security Settings; System Options; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3 : Realms, Roles, and Resources; Introducing Realms, Roles, and Resources; Configuring Realms; Selecting and Configuring General Settings; Selecting and Configuring Authentication Policies; Selecting and Configuring Role Mapping; Optimizing User Attributes; Admin Realms , Configuring RolesUser Roles; General Settings; Standard Options; Meeting Options; Admin Roles; Configuring Resources; Introducing Resource Profiles; Introducing Resource Policies; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4 : Authentication Servers; Introduction; Local Authentication; LDAP; NIS; ACE; Radius; AD/NT; Anonymous; SiteMinder; Certificate; SAML; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5 : Secure Application Manager; Introduction; Why Use SAM?; Feature Availability; Chapter Overview; Secure Application Manager; SAM Versions , How to Deploy the SAM Applet to Connecting Computers?Secure Application Manager Implementation; Enabling SAM and Configuring Role Options; Configuring SAM on a Role; Configuring SAM Resource Policies; Configuring SAM Resource Profiles; Secure Application Manager User Experience; Troubleshooting; Secure Application Manager Troubleshooting; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6 : Terminal Services and Citrix; Introduction; Why Use the Juniper Citrix Terminal Services Proxy?; Feature Availability; Chapter Overview; Terminal Services , Terminal Services ImplementationConfiguring Terminal Services Resource Policies; Configuring Terminal Services Resource Profiles; Configuring Terminal Services and Citrix Using a Hosted Java Applet; Terminal Services User Experience; Citrix; Citrix Client Types; Citrix Implementation; Citrix User Experience; Launching Terminal Services Sessions and Java Applets from an External Site; Terminal Services and Citrix Troubleshooting; IVE-Side Troubleshooting; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7 : Network Connect; Introduction; Why Use Network Connect? , Feature Availability , English
    Weitere Ausg.: ISBN 1-59749-200-0
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz