Juniper(r) Networks Secure Access SSL VPN Configuration Guide

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

1st Edition - December 4, 2007

Write a review

  • Authors: Rob Cameron, Neil Wyler
  • eBook ISBN: 9780080556635

Purchase options

Purchase options
DRM-free (Mobi, PDF, EPub)
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order

Description

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.

Key Features

  • Complete coverage of the Juniper Networks Secure Access SSL VPN line including the 700, 2000, 4000, 6000, and 6000 SP.
  • Learn to scale your appliances to meet the demands of remote workers and offices.
  • Use the NEW coordinated threat control with Juniper Networks IDP to manage the security of your entire enterprise.

Readership

Security specialists, network administrators, and network consultants for medium and large enterprises who secure their networks using Juniper Networks SSL VPN.

Table of Contents

  • Technical Editor and Contributing Author

    Contributors

    Chapter 1: Defining a Firewall

    Why Have Different Types of Firewalls?

    Back to Basics: Transmission Control Protocol/Internet Protocol

    Firewall Types

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Chapter 2: Setup

    Initial CLI Setup

    Initial Web Setup

    Certificates

    Security and System Settings

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Chapter 3: Realms, Roles, and Resources

    Introducing Realms, Roles, and Resources

    Configuring Realms

    Configuring Roles

    Configuring Resources

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Chapter 4: Authentication Servers

    Local Authentication

    LDAP

    NIS

    ACE

    RADIUS

    AD/NT

    Anonymous

    SiteMinder

    Certificate

    SAML

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Chapter 5: Secure Application Manager

    Secure Application Manager

    Secure Application Manager Implementation

    Secure Application Manager User Experience

    Troubleshooting

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Chapter 6: Terminal Services and Citrix

    Terminal Services

    Citrix

    Terminal Services and Citrix Troubleshooting

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Chapter 7: Network Connect

    Network Connect

    Network Connect Troubleshooting

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Chapter 8: Endpoint Security

    Host Checker

    Cache Cleaner

    Secure Virtual Workspace

    IVE/IDP Integration

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Chapter 9: Web/File/Telnet/SSH

    Clientless Remote Access Overview

    Web Access

    File Access

    Telnet/SSH Access

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Chapter 10: Maintenance Section

    System

    Import/Export

    Push Configuration

    Archiving

    Troubleshooting

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Chapter 11: System Section

    Status

    Configuration

    Network

    Clustering

    Virtual Systems

    Logging/Monitoring

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Chapter 12: Sign-in Policies

    IVE Sign-in Structure

    Sign-in Pages

    Sign-in Policies

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Chapter 13: Logging

    Log Types and Facilities

    Log Filtering

    Log Management

    Syslog Exporting

    SNMP Management

    System Resource Monitoring

    Reporting

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Chapter 14: Enterprise Features

    Instant Virtual Systems

    VLANs and Source Routing

    Administration Techniques

    Network Connect Considerations

    Clustering

    Understanding Cluster Communication and Status

    Summary

    Solutions Fast Track

    Frequently Asked Questions

    Index

Product details

  • No. of pages: 656
  • Language: English
  • Copyright: © Syngress 2007
  • Published: December 4, 2007
  • Imprint: Syngress
  • eBook ISBN: 9780080556635

About the Authors

Rob Cameron

Rob Cameron (JNCIS-FWV, JNCIA-M, CCSP, CCSE+) is a Security Solutions Engineer for Juniper Networks. He currently works to design security solutions for Juniper Networks that are considered best practice designs. Rob specializes in network security architecture, firewall deployment, risk management, and high-availability designs. His background includes five years of security consulting for more than 300 customers. This is Rob’s second book; the previous one being Configuring NetScreen Firewalls (ISBN: 1-932266-39-9) published by Syngress Publishing in 2004.

Affiliations and Expertise

Security Solutions Engineer for Juniper Networks, San Jose, CA

Neil Wyler

Neil R. Wyler (JNCIS-FWV, JNCIA-SSL) is an Information Security Engineer and Researcher located on the Wasatch Front in Utah. He is the co-owner of two Utah-based businesses, which include a consulting firm with clients worldwide and a small software start-up. He is currently doing contract work for Juniper Networks, working with the company’s Security Products Group. Neil is a staff member of the Black Hat Security Briefings and Def Con hacker conference. He has spoken at numerous security conferences and been the subject of various online, print, film, and television interviews regarding different areas of information security. He was the Lead Author and Technical Editor of Aggressive Network Self-Defense (Syngress, 1-931836-20-5) and serves on the advisory board for a local technical college.

Affiliations and Expertise

Contractor for Juniper Networks Security Products Group, Black Hat Staff Member, Salt Lake City, Utah

Ratings and Reviews

Write a review

There are currently no reviews for "Juniper(r) Networks Secure Access SSL VPN Configuration Guide"