O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

Book Description

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.
  • Complete coverage of the Juniper Networks Secure Access SSL VPN line including the 700, 2000, 4000, 6000, and 6000 SP.
  • Learn to scale your appliances to meet the demands of remote workers and offices.
  • Use the NEW coordinated threat control with Juniper Networks IDP to manage the security of your entire enterprise.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Technical Editor and Contributing Author
  5. Contributors
  6. Table of Contents
  7. Chapter 1: Defining a Firewall
    1. Why Have Different Types of Firewalls?
    2. Back to Basics: Transmission Control Protocol/Internet Protocol
    3. Firewall Types
    4. Summary
    5. Solutions Fast Track
    6. Frequently Asked Questions
  8. Chapter 2: Setup
    1. Initial CLI Setup
    2. Initial Web Setup
    3. Certificates
    4. Security and System Settings
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  9. Chapter 3: Realms, Roles, and Resources
    1. Introducing Realms, Roles, and Resources
    2. Configuring Realms
    3. Configuring Roles
    4. Configuring Resources
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  10. Chapter 4: Authentication Servers
    1. Local Authentication
    2. LDAP
    3. NIS
    4. ACE
    5. RADIUS
    6. AD/NT
    7. Anonymous
    8. SiteMinder
    9. Certificate
    10. SAML
    11. Summary
    12. Solutions Fast Track
    13. Frequently Asked Questions
  11. Chapter 5: Secure Application Manager
    1. Secure Application Manager
    2. Secure Application Manager Implementation
    3. Secure Application Manager User Experience
    4. Troubleshooting
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  12. Chapter 6: Terminal Services and Citrix
    1. Terminal Services
    2. Citrix
    3. Terminal Services and Citrix Troubleshooting
    4. Summary
    5. Solutions Fast Track
    6. Frequently Asked Questions
  13. Chapter 7: Network Connect
    1. Network Connect
    2. Network Connect Troubleshooting
    3. Summary
    4. Solutions Fast Track
    5. Frequently Asked Questions
  14. Chapter 8: Endpoint Security
    1. Host Checker
    2. Cache Cleaner
    3. Secure Virtual Workspace
    4. IVE/IDP Integration
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  15. Chapter 9: Web/File/Telnet/SSH
    1. Clientless Remote Access Overview
    2. Web Access
    3. File Access
    4. Telnet/SSH Access
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  16. Chapter 10: Maintenance Section
    1. System
    2. Import/Export
    3. Push Configuration
    4. Archiving
    5. Troubleshooting
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  17. Chapter 11: System Section
    1. Status
    2. Configuration
    3. Network
    4. Clustering
    5. Virtual Systems
    6. Logging/Monitoring
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  18. Chapter 12: Sign-in Policies
    1. IVE Sign-in Structure
    2. Sign-in Pages
    3. Sign-in Policies
    4. Summary
    5. Solutions Fast Track
    6. Frequently Asked Questions
  19. Chapter 13: Logging
    1. Log Types and Facilities
    2. Log Filtering
    3. Log Management
    4. Syslog Exporting
    5. SNMP Management
    6. System Resource Monitoring
    7. Reporting
    8. Summary
    9. Solutions Fast Track
    10. Frequently Asked Questions
  20. Chapter 14: Enterprise Features
    1. Instant Virtual Systems
    2. VLANs and Source Routing
    3. Administration Techniques
    4. Network Connect Considerations
    5. Clustering
    6. Understanding Cluster Communication and Status
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  21. Index