Book Image

SSL VPN : Understanding, evaluating and planning secure, web-based remote access

Book Image

SSL VPN : Understanding, evaluating and planning secure, web-based remote access

Overview of this book

Virtual Private Networks (VPNs) provide remote workers with secure access to their company network via the internet by encrypting all data sent between the company network and the user?s machine (the client). Before SSL VPN this typically required the client machine to have special software installed, or at least be specially configured for the purpose. Clientless SSL VPNs avoid the need for client machines to be specially configured. Any computer with a Web browser can access SSL VPN systems. This has several benefits: Low admin costs, no remote configuration Users can safely access the company network from any machine, be that a public workstation, a palmtop or mobile phone By pass ISP restrictions on custom VPNs by using standard technologies SSL VPN is usually provided by a hardware appliance that forms part of the company network. These appliances act as gateways, providing internal services such as file shares, email servers, and applications in a web based format encrypted using SSL. Existing players and new entrants, such as Nokia, Netilla, Symantec, Whale Communications, and NetScreen technologies, are rushing our SSL VPN products to meet growing demand. This book provides a detailed technical and business introduction to SSL VPN. It explains how SSL VPN devices work along with their benefits and pitfalls. As well as covering SSL VPN technologies, the book also looks at how to authenticate and educate users ? a vital element in ensuring that the security of remote locations is not compromised. The book also looks at strategies for making legacy applications accessible via the SSL VPN.
Table of Contents (14 chapters)
SSL VPN
Credits
About the Authors
Introduction
A Review of TCP, IP, and Ports

Remote Access: Measuring Return-on-Investment


In general, the value of a solution designed to provide users with remote access to enterprise resources can be judged on four criteria:

  1. 1. Who can gain remote access: This includes factors such as:

    • How many users can gain access in total?

    • How many users can gain access simultaneously without severely degrading the performance?

    • How complicated is the remote access technology? Will non-technical users be able to use it?

  2. 2. Where can they access from: This includes factors such as:

    • From how many different types of machines can remote access be achieved?

    • Are there any technical requirements at the endpoints (e.g., for special hardware or software) that would preclude access from specific types of locations or devices?

  3. 3. What can be accessed: This includes factors such as:

    • How many different types of resources can be made available remotely using the particular remote-access technology?

    • Are the systems fully available or just in limited form?

    • Will security...