O'Reilly logo

SSL Remote Access VPNs by Qiang Huang, Jazib Frahim

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. SSL VPN Design Considerations

<feature><title>This chapter describes the following topics</title> <objective>

SSL VPN resource access methods

</objective>
<objective>

User authentication and access privilege management

</objective>
<objective>

Security considerations

</objective>
<objective>

Device placement and platform options

</objective>
<objective>

Virtualization

</objective>
<objective>

High availability

</objective>
<objective>

Performance and scalability

</objective>
</feature>

This chapter discusses design issues you should consider when you build a Secure Socket Layer (SSL) Virtual Private Network (VPN) solution. Readers with experience managing a remote access solution, such as IP security (IPsec)–based remote access VPN, will recognize ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required