更新时间:2021-04-29 19:20:31
封面
书名页
SSL VPN
Credits
About the Authors
Introduction
What This Book Covers
Conventions
Reader Feedback
Customer Support
Chapter 1. Introduction to SSL VPN
The Internet
Reference Models
Introducing Hacker Bob
VPNs
VPN Examples
IPsec Vs. SSL VPN
Trusted Networks
The DMZ
Summary
Chapter 2. SSL VPN: The Business Case
SSL VPN: A Historical Background
Remote Access: Measuring Return-on-Investment
So What Does SSL VPN Actually Give Me?
Chapter 3. How SSL VPNs Work
Appliances Vs. Software
The SSL Protocol
Establishing Secure Tunnels Using SSL
Reverse Proxy Technology
SSL Remote Access: Reverse Proxy Technology Plus
SSL VPN Sample Session
Chapter 4. SSL VPN Security
Authentication and Authorization
End Point Security Concerns
Department of Defense (DoD) Requirements
Server-Side Security Issues
Chapter 5. Planning for an SSL VPN
Determining Business Requirements
Selecting an Appropriate SSL VPN
Determining which SSL VPN Functions to Use
Where to Deploy the SSL VPN server
Planning for Deployment
User and Administrator Training
Chapter 6. Educating the User
Building an Education Plan
Chapter 7. Legacy Data Access
Computing Elements
Applications
The Web Challenge
Meeting the Challenge
Tunneling to the Other Side
Other Applications
Chapter 8. The Future of SSL VPN Technology
Standardized Feature Sets
Interfaces
SSL VPN Products for Small Medium and Large Organizations
Application-Specific SSL VPNs
Merging with IPSec VPN and Firewall Technology
SSL Access Platforms
Support for More Diverse Computers
Improved Performance and Reliability
Voice-Over-IP
Two "Business Developments"
Appendix A. A Review of TCP IP and Ports
DARPA and OSI
Appendix B. SSL VPN Gateways
SSL VPN Offerings
AEP Systems
Array Networks
Aventail
Check Point Software Technologies
Cisco Systems
Citrix Systems
EnKoo
F5 Networks
Juniper Networks
NetScaler
NetSilica
Netilla Networks
Nokia
Nortel Networks
Permeo Technologies
PortWise
SafeNet
Symantec
Whale Communications
Index