SSL VPN : Understanding, evaluating and planning secure, web-based remote access

A comprehensive overview of SSL VPN technologies and design strategies

SSL VPN : Understanding, evaluating and planning secure, web-based remote access

Joseph Steinberg, Tim Speed

A comprehensive overview of SSL VPN technologies and design strategies
Mapt Subscription
FREE
$29.99/m after trial
eBook
$21.00
RRP $29.99
Save 29%
Print + eBook
$49.99
RRP $49.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$21.00
$49.99
$29.99p/m after trial
RRP $29.99
RRP $49.99
Subscription
eBook
Print + eBook
Start 30 Day Trial
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 
Code Files
Preview in Mapt

Book Details

ISBN 139781904811077
Paperback212 pages

Book Description

Virtual Private Networks (VPNs) provide remote workers with secure access to their company network via the internet by encrypting all data sent between the company network and the user?s machine (the client). Before SSL VPN this typically required the client machine to have special software installed, or at least be specially configured for the purpose.

Clientless SSL VPNs avoid the need for client machines to be specially configured. Any computer with a Web browser can access SSL VPN systems. This has several benefits:

  • Low admin costs, no remote configuration
  • Users can safely access the company network from any machine, be that a public workstation, a palmtop or mobile phone
  • By pass ISP restrictions on custom VPNs by using standard technologies

SSL VPN is usually provided by a hardware appliance that forms part of the company network. These appliances act as gateways, providing internal services such as file shares, email servers, and applications in a web based format encrypted using SSL. Existing players and new entrants, such as Nokia, Netilla, Symantec, Whale Communications, and NetScreen technologies, are rushing our SSL VPN products to meet growing demand.

This book provides a detailed technical and business introduction to SSL VPN. It explains how SSL VPN devices work along with their benefits and pitfalls. As well as covering SSL VPN technologies, the book also looks at how to authenticate and educate users ? a vital element in ensuring that the security of remote locations is not compromised. The book also looks at strategies for making legacy applications accessible via the SSL VPN.

Table of Contents

Chapter 1: Introduction to SSL VPN
The Internet
Reference Models
Introducing Hacker Bob
VPNs
VPN Examples
IPsec Vs. SSL VPN
Trusted Networks
The DMZ
Summary
Chapter 2: SSL VPN: The Business Case
SSL VPN: A Historical Background
Remote Access: Measuring Return-on-Investment
So What Does SSL VPN Actually Give Me?
Summary
Chapter 3: How SSL VPNs Work
Appliances Vs. Software
The SSL Protocol
Establishing Secure Tunnels Using SSL
Reverse Proxy Technology
SSL Remote Access: Reverse Proxy Technology Plus
SSL VPN Sample Session
Summary
Chapter 4: SSL VPN Security
Authentication and Authorization
End Point Security Concerns
Department of Defense (DoD) Requirements
Server-Side Security Issues
Summary
Chapter 5: Planning for an SSL VPN
Determining Business Requirements
Selecting an Appropriate SSL VPN
Determining which SSL VPN Functions to Use
Where to Deploy the SSL VPN server
Planning for Deployment
User and Administrator Training
Summary
Chapter 6: Educating the User
Building an Education Plan
Summary
Chapter 7: Legacy Data Access
Computing Elements
Applications
The Web Challenge
Meeting the Challenge
Tunneling to the Other Side
Other Applications
Summary
Chapter 8: The Future of SSL VPN Technology
Standardized Feature Sets
Interfaces
SSL VPN Products for Small, Medium, and Large Organizations
Application-Specific SSL VPNs
Merging with IPSec VPN and Firewall Technology
SSL Access Platforms
Support for More Diverse Computers
Improved Performance and Reliability
Voice-Over-IP
Two "Business Developments"
Summary

What You Will Learn

  • How SSL VPN technology works, and how it fits into existing network architectures
  • Evaluating SSL VPN for your organization
  • Understand what to look out for when talking to vendors
  • How to plan an SSL VPN implementation for your business
  • Educate staff to maintain SSL VPN security
  • Strategies for providing access to internal legacy applications via SSL VPN
  • A heads-up on likely trends and possibilities for the future of SSL VPN

 

Authors

Table of Contents

Chapter 1: Introduction to SSL VPN
The Internet
Reference Models
Introducing Hacker Bob
VPNs
VPN Examples
IPsec Vs. SSL VPN
Trusted Networks
The DMZ
Summary
Chapter 2: SSL VPN: The Business Case
SSL VPN: A Historical Background
Remote Access: Measuring Return-on-Investment
So What Does SSL VPN Actually Give Me?
Summary
Chapter 3: How SSL VPNs Work
Appliances Vs. Software
The SSL Protocol
Establishing Secure Tunnels Using SSL
Reverse Proxy Technology
SSL Remote Access: Reverse Proxy Technology Plus
SSL VPN Sample Session
Summary
Chapter 4: SSL VPN Security
Authentication and Authorization
End Point Security Concerns
Department of Defense (DoD) Requirements
Server-Side Security Issues
Summary
Chapter 5: Planning for an SSL VPN
Determining Business Requirements
Selecting an Appropriate SSL VPN
Determining which SSL VPN Functions to Use
Where to Deploy the SSL VPN server
Planning for Deployment
User and Administrator Training
Summary
Chapter 6: Educating the User
Building an Education Plan
Summary
Chapter 7: Legacy Data Access
Computing Elements
Applications
The Web Challenge
Meeting the Challenge
Tunneling to the Other Side
Other Applications
Summary
Chapter 8: The Future of SSL VPN Technology
Standardized Feature Sets
Interfaces
SSL VPN Products for Small, Medium, and Large Organizations
Application-Specific SSL VPNs
Merging with IPSec VPN and Firewall Technology
SSL Access Platforms
Support for More Diverse Computers
Improved Performance and Reliability
Voice-Over-IP
Two "Business Developments"
Summary

Book Details

ISBN 139781904811077
Paperback212 pages
Read More

Read More Reviews

Recommended for You

Mastering OpenCV with Practical Computer Vision Projects Book Cover
Mastering OpenCV with Practical Computer Vision Projects
$ 26.99
$ 5.40
OpenCV Computer Vision with Python Book Cover
OpenCV Computer Vision with Python
$ 17.99
$ 3.60
MediaWiki 1.1 Beginner's Guide Book Cover
MediaWiki 1.1 Beginner's Guide
$ 23.99
$ 16.80
Getting started with Audacity 1.3 Book Cover
Getting started with Audacity 1.3
$ 23.99
$ 2.40
Getting Started with Talend Open Studio for Data Integration Book Cover
Getting Started with Talend Open Studio for Data Integration
$ 26.99
$ 18.90
PHP Ajax Cookbook Book Cover
PHP Ajax Cookbook
$ 26.99
$ 18.90