Ssl Vpn: Understanding, Evaluating, and Planning Secure, Web-based Remote AccessA comprehensive overview of SSL VPN technologies and design strategies. |
Other editions - View all
Common terms and phrases
access device administrators allow antivirus applet application firewalling applicationlevel Asymmetric Cryptography authentication browser cached capabilities Chapter communications Company Information Product computers configuration connection over SSL corporate network credentials cryptography decryption discussed email encrypted end user Endpoint environment example files functions Hacker Hacker Bob handheld devices Information Appliance Information Product Information infrastructure interface internal network Internet inthe IP address IPSec VPN Juniper Networks keystroke loggers L2TP Layer legacy applications locations Lotus Notes machines networklevel NonWeb Traffic ofSSL ofthe operating system organization OSI Model packet password performance Phishing Phone port portal problem Product Information Appliance protocol remote access remote users requests require reverse proxy specific spyware SSL Acceleration SSL VPN products SSL VPN server SSL VPN session SSL VPN technology standard Telnet theSSL VPN thirdparty timeout tothe tunneling typically user's username utilize vendors web browser WebBased Applications