Juniper(r) Networks Secure Access SSL VPN Configuration Guide
- 1st Edition - December 4, 2007
- Authors: Rob Cameron, Neil R. Wyler
- Language: English
- Paperback ISBN:9 7 8 - 1 - 5 9 7 4 9 - 2 0 0 - 3
- eBook ISBN:9 7 8 - 0 - 0 8 - 0 5 5 6 6 3 - 5
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system… Read more

Purchase options
Institutional subscription on ScienceDirect
Request a sales quote- Complete coverage of the Juniper Networks Secure Access SSL VPN line including the 700, 2000, 4000, 6000, and 6000 SP.
- Learn to scale your appliances to meet the demands of remote workers and offices.
- Use the NEW coordinated threat control with Juniper Networks IDP to manage the security of your entire enterprise.
Technical Editor and Contributing Author
Contributors
Chapter 1: Defining a Firewall
Why Have Different Types of Firewalls?
Back to Basics: Transmission Control Protocol/Internet Protocol
Firewall Types
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 2: Setup
Initial CLI Setup
Initial Web Setup
Certificates
Security and System Settings
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 3: Realms, Roles, and Resources
Introducing Realms, Roles, and Resources
Configuring Realms
Configuring Roles
Configuring Resources
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 4: Authentication Servers
Local Authentication
LDAP
NIS
ACE
RADIUS
AD/NT
Anonymous
SiteMinder
Certificate
SAML
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 5: Secure Application Manager
Secure Application Manager
Secure Application Manager Implementation
Secure Application Manager User Experience
Troubleshooting
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 6: Terminal Services and Citrix
Terminal Services
Citrix
Terminal Services and Citrix Troubleshooting
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 7: Network Connect
Network Connect
Network Connect Troubleshooting
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 8: Endpoint Security
Host Checker
Cache Cleaner
Secure Virtual Workspace
IVE/IDP Integration
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 9: Web/File/Telnet/SSH
Clientless Remote Access Overview
Web Access
File Access
Telnet/SSH Access
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 10: Maintenance Section
System
Import/Export
Push Configuration
Archiving
Troubleshooting
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 11: System Section
Status
Configuration
Network
Clustering
Virtual Systems
Logging/Monitoring
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 12: Sign-in Policies
IVE Sign-in Structure
Sign-in Pages
Sign-in Policies
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 13: Logging
Log Types and Facilities
Log Filtering
Log Management
Syslog Exporting
SNMP Management
System Resource Monitoring
Reporting
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 14: Enterprise Features
Instant Virtual Systems
VLANs and Source Routing
Administration Techniques
Network Connect Considerations
Clustering
Understanding Cluster Communication and Status
Summary
Solutions Fast Track
Frequently Asked Questions
Index
- No. of pages: 656
- Language: English
- Edition: 1
- Published: December 4, 2007
- Imprint: Syngress
- Paperback ISBN: 9781597492003
- eBook ISBN: 9780080556635
RC
Rob Cameron
NW