CISCO REMOTE ACCESS VPN SOLUTIONS

Size: px
Start display at page:

Download "CISCO REMOTE ACCESS VPN SOLUTIONS"

Transcription

1 CISCO REMOTE ACCESS VPN SOLUTIONS Remote Connectivity for Any Deployment Scenario Sami Iivarinen Systems Engineer Cisco Systems Finland 1

2 Agenda Solution Overview Cisco WebVPN SSL VPN Connectivity 2

3 Cisco Strategy for Remote Access Using Best Fit IPSec and SSL VPN Technologies Supply Partner Extranet Central Site Account Manager Mobile User IP/Internet VPN Software Engineer Telecommuter Doctor at Home Unmanaged Desktop SSL VPN IPSEC VPN PARTNER Few apps/servers, tight access control, no control over desktop software environment, firewall traversal DOCTOR Occasional access, few apps, no desktop software control ENGINEER Many servers/apps, needs native app formats, VoIP, frequent access, long connect times ACCOUNT MANAGER Diverse apps, homegrown apps, always works from enterprisemanaged desktop 3

4 VPN 3000 Concentrator Solution Overview Features and Benefits SSL VPN IPSEC VPN Broad Application Access: Clientless, Thin Client & Network- Layer Client Modes Endpoint Security without Compromise Clientless Terminal Services Support Per-User/Group Portal and Access Customization Easy VPN for Touchless Client Management Automated VPN Client Updates for Ease of Client Deployment & Versioning Integrated Endpoint Security Proactive Endpoint Security Posture Assessment Flexible Access Controls Broad Browser Support Foundation Features for Ease of Operations Clustering & Load Balancing Broad End-System OS Support Flexible User Authentication & Access Control Group-Based User Management Unified Web-Based Management 4

5 Cisco WebVPN Customizable Application Access with Comprehensive Security Cisco Systems, Inc. All rights reserved. 5

6 Cisco VPN 3000 Concentrator Setting the Standard in Remote Access VPNs PRICE Integrated IPSec and SSL VPN solution Dynamic load balancing and device clustering Flexible user authentication methods Integrated web-based management Numerous industry awards VPN 3030 or 3060 Clusters N x 500 = 1000s of SSL VPN Sessions VPN SSL VPN Sessions VPN SSL VPN Sessions VPN SSL VPN Sessions SOHO ROBO SMB ENTERPRISE FUNCTIONALITY 6

7 Cisco WebVPN Version 4.7 Enabling Flexible, Secured SSL VPN Connectivity Requirement Solution All SSL VPN Features Included in Base Pricing No Special Licenses! Customizable Application Access for Diverse Deployments Comprehensive, Reliable Endpoint Security Clientless, Thin Client, and Network Access for: Company-managed desktops Employee-owned home PCs Public terminals Extranet partner desktops Consultants Cisco Secure Desktop Security posture assessment Data privacy and malware protection Post-session clean-up Efficient Operations, Cost Effective Solution Cost-Effective Deployment and Operations Minimized end-system software downloads Operates with non-microsoft browsers All functionality included in base price Leverage existing VPN 3000 investment 7

8 Customizable Application Access Deployment Examples: Extending Appropriate Connectivity Company-Managed SSL VPN Tunneling Desktop: Client Controlled Persistent, software LAN-like environment networked connectivity Known Access security to virtually posture any & application system privileges Diverse Utilizes application small, dynamically requirements loaded client Post-session Best option for clean-up broad optional application access LAN-like remote connectivity desired Home/Kiosk Clientless, Web-Based Access: Access Uncontrolled Reverse proxy environment firewalled - support connection issues Unknown Access to security web-based posture applications & system and privileges Citrix Limited No software application downloaded access allowed Posture Best option assessment, for limited post-session web application clean-up access required and Customized unmanaged access desktops portal often desirable Partner Thin Client Access: Port Forwarding Uncontrolled Reverse proxy environment firewalled - support connection issues Unknown Access to security web, , posture calendar, & system IM and privileges many other Very TCP granular applications access controls Posture Small Java assessment, applet dynamically post-session loaded clean-up required Customized Best option access for limited portal web often and desirable client/server applications and unmanaged desktops 8

9 Security Challenges SSL VPN Brings New Points of Attack Supply Partner Extranet Machine Employee at Home Unmanaged Machine Remote User Customer Managed Machine Before SSL VPN Session Who owns the endpoint? Endpoint security posture: AV, personal firewall? Is malware running? During SSL VPN Session Is session data protected? Are typed passwords protected? Has malware launched? After SSL VPN Session Browser cached intranet web pages? Browser stored passwords? Downloaded files left behind? 9

10 Cisco Secure Desktop Comprehensive Endpoint Security for SSL VPN Complete Pre-Connect Assessment: Location assessment managed or unmanaged desktop? Security posture assessment AV operational/up-to-date, personal firewall operational, malware present? Works with Desktop Guest Permissions No Admin Privileges Required Comprehensive Session Protection: Data sandbox and encryption protects every aspect of session Malware detection with hooks to Microsoft free anti-spyware software Windows 2000 or XP Original User Desktop Cisco Secure Desktop Temporary CSD Desktop Post-Session Clean-Up: Encrypted partition overwrite (not just deletion) using DoD algorithm Cache, history and cookie overwrite File download and attachment overwrite Auto-complete password overwrite 10

11 Cisco Secure Desktop How it Works Step One: A user on the road connects with the concentrator and logs in Step Two: The concentrator pushes down the Cisco Secure Desktop Step Three: An encrypted sandbox or hard drive partition is created for the user to work in Step Four: At Logout the Virtual Desktop that the user has been working in is eradicated and the user is notified Cisco Clientless Secure Note: CSD download and SSL Desktop VPN eradication is seamless to the user. If the user forgets to terminate the session autotimeout will close the session www and erase all session information Employee- Owned Desktop Enterprise HQ 11

12 Cisco Secure Desktop Malware Detection Features: At session initiation CSD checks the host system for abnormal drivers indicating the presence of keystroke logging programs CSD prompts the user to select and terminate the suspicious modules before loading the Secure Desktop If the user does not acknowledge that all unrecognized keystroke loggers are safe, the connection will not establish User is notified during the session if a keystroke logger is attempting install from within the secure desktop Remote User Public Machine CSD can also be configured to check for the Microsoft AntiSpyware Software as part of its pre-connection host checking capability 12

13 Cisco Secure Desktop Easy-to-Use and Manage Session Protection Transparent to the end user with automatic session creation Works with desktop guest permissions Small download size (less than 500 KB) for fast session initiation Delivered via Active X, Java or.exe to ensure operation in diverse environments Customizable interface and templates User still has access to all of the PC s hardware and software resources All applications and processes running in the Secure Desktop are controlled Creates a cryptographic file system on the fly and nothing is ever written in clear on the disk user cannot unintentionally save data outside the partition CSD Security Features Prevents digital leakage Protects user privacy Is easy to implement & manage 13

14 Cisco Secure Desktop Technical Details CSD components are installed or updated Installation can be done through either an activex, a java applet or an executable Total size is less than 500kB No reboot, no specific privilege required Secure vault is created CSD supports triple DES (168-bit key) and RC4 (128-bit key) encryption 128-character password is randomly generated Virtual session is created All processes on the Virtual Desktop are monitored and can be controlled All hard-disk (file or registry) are redirected to the vault Session is closed Vault is closed All processes on the Virtual Desktop are killed Secure vault is closed and password is lost At this time, it is not possible to recover any information Vault is destroyed Byte-to-byte Sanitization of the vault Implementation of the Department of Defense clearing and sanitizing standard DOD M 14

15 Using Cisco Secure Desktop for Security/Auditing Compliance Issue: HIPAA, Sarbanes-Oxley, and numerous other regulations require privacy of sensitive information Cisco Secure Desktop eases regulatory compliance associated with remote access through: Easily demonstrated separation or sandboxing of all session data and downloaded content to compliance auditors Extensive logging for Cisco Secure Desktop activities Was it loaded on endpoint? Did it execute properly? Validation of remote system security posture prior to session initiation Full session data overwrite using government approved DoD sanitation algorithm 15

16 Cache Cleaner for Linux and Mac Running the Cache Cleaner on Host Machines Remote Machine The Cache Cleaner provides for the disabling or erasing all data that was downloaded, input, or created in the browser including file downloads, cached browser information, passwords entered, and auto-complete information. The Cache Cleaner can be used with: Macintosh (MacOS X) - Safari 1.0 or later Red Hat Linux v9 - Mozilla 1.1 or later on Windows 98, Me, NT4, 2000, and XP - Explorer 5.0 or later Cisco Secure Desktop generally used for Windows systems, though Cache Cleaner may be deployed to standardize functionality with Mac and Linux desktops 16

17 Customizable Application Access Network Tunneling Client for WebVPN Leverages depth of Cisco encryption client experience to deliver a lightweight, stable and easy-to-support SSL VPN tunneling client Features Enables IPSec-like application access through web-pushed client Less than 250KB download via Java, Active X or.exe No re-boot required after installation Client may be either removed at end of session or left permanently installed Compatible with Cisco Softphone for VoIP support Touchless central site configuration Benefits Fast client download time Multiple delivery methods ensure broad compatibility No reboot = happy users No trace of client after session provides better security Touchless administration Multimedia data, voice desktops for greatest user productivity 17

18 Network Tunneling Client for WebVPN How it Operates Log into WebVPN URL Download Tunneling Client TCP Connect (Port x or default 443) (Remote User/Machine) Initiates SSL Handshake SSL Server Certificate (Chain) Complete Handshake VPN 3000 (SSL Gateway) Note: Tunneling client pushed via Active X, Java, and then.exe 18

19 Network Tunneling Client Software Attributes Download Size of 250KB or less Windows 2000 and XP support Works on non-english Windows System compatibility and version detection before download No Reboots! Removal of client at termination (if desired by administrator) Central Site Configuration for WINS, DNS, etc. No dependencies on installed applications Co-existence with other security applications (CSA, VPN Clients, Anti-virus, etc.) 19

20 WebVPN Clientless Access Fully Clientless Citrix Support Port Forwarding Applet Download Slow download, software conflicts, browser blocks applet Citrix Server Citrix Server Truly Clientless Citrix Support Typical SSL VPN Citrix Support Citrix support requires vendor SSL Client or Java applets or other system resident software Slow application initiation May not function due to browser security settings Potential software conflicts, especially on non-managed systems Cisco Citrix Support Truly clientless Citrix Access Fast initiation time nothing additional to download High performance no local application translation Not impacted by differences in browser preference or security settings Highly stable no potential for client software conflicts 20

21 WebVPN Clientless Access Fully Clientless Citrix Support Citrix (ICA) is a software application that allows remote access to centralized computing resources. Companies leverage Citrix deployments to centralize all applications on the network without requiring software to be installed on the remote PC, or if remote access to a specific non-web enabled application is necessary. To use Citrix, the client user must have an ICA client installed on the machine. Citrix ICA clients are presently available for Windows, Mac OS, UNIX, Windows Based Terminals, and many handheld platforms. A Java-based Citrix ICA client is also available. 21

22 WebVPN Clientless Access Pocket PC Support Pocket PC 2003 Browser: Pocket Internet Explorer (PIE) SW: Microsoft + Manufacture OEMs The built in browser with Pocket PC 2003 is compatible with WebVPN clientless access. Internet 22

23 Customizable Application Access Thin Client Port Forwarding Supplements pure clientless web browser access by providing connectivity to non-webified thick client applications like: POP, SMTP or IMAP Outlook, Notes, etc. Instant messaging Calendar Client-initiated TCP-based applications like Telnet Java-based applet (Sun JVM v1.4+) Less than 100KB download 23

24 Granular Access Controls & Portal Customizability Enabling Application and Content Control Access controls per-group or user from RADIUS, LDAP or defined on-box Filter to IP, file, URL and server level WebVPN portal dynamically customizable based on access controls Customizable Banner Graphic Customizable Floating Toolbar with Fast Links Customizable Banner Message Customizable Colors and Sections Customizable Access Methods Customizable Links, Network Resource Access 24

25 Monitoring, Reporting, Troubleshooting Extensive session logging for security and troubleshooting Per user session statistics, connect time, bytes transferred, hosts accessed Endpoint security monitoring and alerts for unsuccessful endpoint session security Integrated monitoring reports for quick statistics on usage and user behavior 25

26 See an On-Line WebVPN Demo Go to: 26

27 Cisco WebVPN Summary WEBVPN FOR SSL VPN Flexible application access for any deployment scenario Reliable, comprehensive security against virus/worm propagation and data theft Fully clientless Citrix delivers better performance and reliability for end-users Mature, stable network tunneling client All features included in simple, cost-effective pricing COMBINED IPSEC & SSL VPN Not forced down a single technology path May utilize existing VPN 3000 infrastructure No need for parallel equipment or management infrastructures Streamlined operations all remote connectivity options on one management console Simplified operations one platform covers every deployment environment Customizable Application Access with Comprehensive Security 27

28 Presentation_ID 2001, Cisco Systems, 2005 Inc. Cisco All Systems, rights reserved. Inc. All rights reserved. 28

SSL-Based Remote-Access VPN Solution

SSL-Based Remote-Access VPN Solution Cisco IOS SSL VPN SSL-Based Remote-Access VPN Solution Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity integrated

More information

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity

More information

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity

More information

Cisco ASA 5500 Series VPN Edition

Cisco ASA 5500 Series VPN Edition Data Sheet Cisco ASA 5500 Series VPN Edition The Cisco ASA 5500 Series Adaptive Security Appliance is a purpose-built platform that combines best-in-class security and VPN services for small and medium-sized

More information

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4)

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4) Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets

More information

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an

More information

Novell Access Manager SSL Virtual Private Network

Novell Access Manager SSL Virtual Private Network White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...

More information

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6)

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6) Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

PRODUCT CATEGORY BROCHURE

PRODUCT CATEGORY BROCHURE PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size

More information

Citrix Access Gateway

Citrix Access Gateway F E A T U R E S O V E R V I E W Citrix Access Gateway Citrix Access Gateway is a universal SSL VPN appliance that combines the best features of IPSec and typical SSL VPNs without the costly and cumbersome

More information

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations

More information

SSL VPN Technical Primer

SSL VPN Technical Primer 4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: info@netgear.com www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses

More information

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations Choosing Remote-Access VPN Technologies, Securing the VPN Deployment Defining Remote-Access VPNs Remote-access VPNs allow

More information

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013 SSL VPN Server Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Citrix Access on SonicWALL SSL VPN

Citrix Access on SonicWALL SSL VPN Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring

More information

Securing Citrix with SSL VPN Technology

Securing Citrix with SSL VPN Technology Securing Citrix with SSL VPN Technology An AEP Networks Solution Summary For years, Citrix Systems has dominated the server-based computing market as the solution of choice for application access across

More information

Tutorial: Assigning Prelogin Criteria to Policies

Tutorial: Assigning Prelogin Criteria to Policies CHAPTER 4 This tutorial provides an overview of the CSD configuration sequence. The configuration chapters that follow provide detailed instructions on the attributes. The sections are as follows: Overview

More information

Cisco IOS Secure Sockets Layer (SSL) VPN Technology Overview

Cisco IOS Secure Sockets Layer (SSL) VPN Technology Overview Cisco IOS Secure Sockets Layer (SSL) VPN Technology Overview March 2008 Cisco.com/go/iossslvpn 2008 Cisco Systems, Inc. All rights reserved. 1 Agenda Introduction to Cisco IOS SSL VPN Positioning and Use

More information

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Secure remote access to your applications and data. Secure Application Access

Secure remote access to your applications and data. Secure Application Access Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network

More information

Clientless SSL VPN End User Set-up

Clientless SSL VPN End User Set-up 37 CHAPTER This ections is for the system administrator who sets up Clientless (browser-based) SSL VPN for end users. It summarizes configuration requirements and tasks for the user remote system. It also

More information

Java Secure Application Manager

Java Secure Application Manager Java Secure Application Manager How-to Introduction:...1 Overview:...1 Operation:...1 Example configuration:...2 JSAM Standard application support:...6 a) Citrix Web Interface for MetaFrame (NFuse Classic)...6

More information

SSL VPN Server Guide. Access Manager 4.0. November 2013

SSL VPN Server Guide. Access Manager 4.0. November 2013 SSL VPN Server Guide Access Manager 4.0 November 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A

More information

Cisco ASA 5500 Series SSL/IPsec VPN Edition

Cisco ASA 5500 Series SSL/IPsec VPN Edition 5500 Series SSL/IPsec VPN Edition The Cisco ASA 5500 Series Adaptive Security Appliance is a purpose-built platform that combines best-in-class security and VPN services for small and medium-sized business

More information

www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

What s New in Juniper s SSL VPN Version 6.0

What s New in Juniper s SSL VPN Version 6.0 What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Juniper SSL VPN Notes Page 1

Juniper SSL VPN Notes Page 1 Juniper SSL VPN Notes Page 1 The Juniper SSL VPN is a full-featured appliance using SSL protocol to allow remote computers to securely access our organization s resources with a standard browser. The types

More information

Dell SonicWALL SRA 7.5 Citrix Access

Dell SonicWALL SRA 7.5 Citrix Access Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about

More information

Copyright Giritech A/S. Secure Mobile Access

Copyright Giritech A/S. Secure Mobile Access Secure Mobile Access From everywhere... From any device... From user......to applications Page 3...without compromising on security and usability... and to my PC in the office: Secure Virtual Access Contrary

More information

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition Why Switch from IPSec to SSL VPN And Four Steps to Ease Transition Table of Contents The case for IPSec VPNs 1 The case for SSL VPNs 2 What s driving the move to SSL VPNs? 3 IPSec VPN management concerns

More information

AnyConnect VPN Client FAQ

AnyConnect VPN Client FAQ AnyConnect VPN Client FAQ Document ID: 107391 Questions Introduction What level of rights is required for the AnyConnect client? Is a reboot required after AnyConnect is installed/upgraded? Is it possible

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Family Datasheet AEP Series A

Family Datasheet AEP Series A Trusted Security Everywhere Family Datasheet AEP Series A Covering: Hardware Edition Virtual Edition Load Balancer AEP Networks, Inc. All rights reserved. Secure Application Access 2500. 4500. 6500. 8500

More information

2003, Rainbow Technologies, Inc.

2003, Rainbow Technologies, Inc. Expertise Corporate 25 Years of Security SMB to Fortune 30 Access Control 28 Million Hardware Keys 50% Token market share 6 Years of ikey Web Security 10 Years of SSL Secure > 50% of the Data NetSwift

More information

Get Success in Passing Your Certification Exam at first attempt!

Get Success in Passing Your Certification Exam at first attempt! Get Success in Passing Your Certification Exam at first attempt! Exam : 920-440 Title : nncde wireless lan Version : DEMO 1. A customer wants to access the Microsoft Outlook Web Access application through

More information

Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN

Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN Businesses can enhance user satisfaction, productivity, profitability and security by leveraging existing infrastructure to

More information

Cisco ASA 5500 Series VPN Edition for the Enterprise

Cisco ASA 5500 Series VPN Edition for the Enterprise Solution Overview Cisco ASA 5500 Series VPN Edition for the Enterprise CISCO ASA 5500 SERIES VPN EDITION PROVIDES CUSTOMIZABLE, SECURE, AND COST-EFFECTIVE REMOTE ACCESS The Cisco ASA 5500 Series VPN Edition

More information

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

Licenses are not interchangeable between the ISRs and NGX Series ISRs. Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

Mobile Access R75.40. Administration Guide. 13 August 2012. Classification: [Protected]

Mobile Access R75.40. Administration Guide. 13 August 2012. Classification: [Protected] Mobile Access R75.40 Administration Guide 13 August 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

SSL VPN User Guide. Access Manager 4.0. November 2013

SSL VPN User Guide. Access Manager 4.0. November 2013 SSL VPN User Guide Access Manager 4.0 November 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE

More information

Secure iphone Access to Corporate Web Applications

Secure iphone Access to Corporate Web Applications F5 Technical Brief Secure iphone Access to Corporate Web Applications The way corporations operate around mobile devices is currently shifting employees are starting to use their own devices for business

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide

Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide ii Preface Copyright Information: Symantec Corporation Copyright

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Secure Virtual Assist/ Access/Meeting

Secure Virtual Assist/ Access/Meeting Secure Virtual Assist/ Access/Meeting Easy-to-use tools for secure remote support, PC control and collaboration Technical support by phone, email, chat and pre-installed remote support clients can be cumbersome,

More information

SSL VPN Grows Up: Time to Demand More from Your Next SSL VPN

SSL VPN Grows Up: Time to Demand More from Your Next SSL VPN SSL VPN Grows Up: Time to Demand More from Your Next SSL VPN Written for WatchGuard Technologies by Lisa Phifer, Core Competence May 2009 Introduction Years ago, businesses started turning to SSL VPNs

More information

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Volume SYSLOG JUNCTION. User s Guide. User s Guide Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages

More information

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco

More information

Aventail SSL VPN. Installation and Administration Guide. Version 9.0.0

Aventail SSL VPN. Installation and Administration Guide. Version 9.0.0 Aventail SSL VPN Installation and Administration Guide Version 9.0.0 2008 SonicWALL, Inc. All rights reserved. SonicWALL is a registered trademark of SonicWALL, Inc. Other product names mentioned herein

More information

Cisco Adaptive Security Appliance Smart Tunnels Solution Brief

Cisco Adaptive Security Appliance Smart Tunnels Solution Brief Guide Cisco Adaptive Security Appliance Smart Tunnels Solution Brief August 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise

Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise Solution Overview Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise CISCO ASA 5500 SERIES SSL / IPSEC VPN EDITION PROVIDES CUSTOMIZABLE, SECURE, AND COST- EFFECTIVE REMOTE ACCESS The Cisco

More information

WHITEPAPER IPSEC VPN Vs. SSL VPN

WHITEPAPER IPSEC VPN Vs. SSL VPN WHITEPAPER IPSEC VPN Vs. SSL VPN Introduction Whether a result of tele-working initiatives, contingencies for events such as 9/11, SARS, and the East Coast Blackout, or just addressing the need to balance

More information

Campus VPN. Version 1.0 September 22, 2008

Campus VPN. Version 1.0 September 22, 2008 Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Data Sheet Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access

More information

SSL VPN Portal Options

SSL VPN Portal Options 1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the SSL VPN Wizard to configure SSL VPN portals on the ProSecure Unified Threat Management (UTM) Appliance. The Secure Sockets

More information

TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction.

TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction. TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise June 2008 Introduction Whether you are looking to securely deliver applications and

More information

Windows in a Browser Secure Remote Access with HOB RD VPN

Windows in a Browser Secure Remote Access with HOB RD VPN Windows in a Browser Secure Remote Access with HOB RD VPN by Patrick Oliver Graf HOB March 2006/ Rev. 3 February 2010 1 of 5 Introduction This white paper describes the possibilities of Secure Remote Access

More information

Secured email Enterprise eprivacy Suite

Secured email Enterprise eprivacy Suite EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy

More information

Introduction to Endpoint Security

Introduction to Endpoint Security Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse

More information

NetSupport Manager v11

NetSupport Manager v11 Remote Support For Any Environment NetSupport Manager v11 NetSupport Manager has been helping organizations optimize the delivery of their IT support services since 1989 and while the use of Remote Control

More information

WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560

WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560 WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Barracuda SSL VPN Administrator s Guide

Barracuda SSL VPN Administrator s Guide Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,

More information

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc

More information

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 Copyright 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2 The Traditional Extended Enterprise Fixed

More information

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

More information

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN 1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10

More information

Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources

Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................

More information

END-TO-END SECURITY WITH SA SERIES SSL VPN APPLIANCES

END-TO-END SECURITY WITH SA SERIES SSL VPN APPLIANCES SOLUTION BRIEF END-TO-END SECURITY WITH SA SERIES SSL VPN APPLIANCES Ensure Remote Users and Devices Meet Security Requirements Before Granting Access to Network Resources Challenge As the global workforce

More information

Citrix XenApp Fundamentals Administrator s Guide

Citrix XenApp Fundamentals Administrator s Guide Citrix XenApp Fundamentals Administrator s Guide Citrix XenApp Fundamentals 3.1.0 for Windows Server 2008 Copyright and Trademark Notice Information in this document is subject to change without notice.

More information

v7.8.2 Release Notes for Websense Content Gateway

v7.8.2 Release Notes for Websense Content Gateway v7.8.2 Release Notes for Websense Content Gateway Topic 60086 Web Security Gateway and Gateway Anywhere 12-Mar-2014 These Release Notes are an introduction to Websense Content Gateway version 7.8.2. New

More information

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 8.1, Enterprise Edition

Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide. Citrix Access Gateway 8.1, Enterprise Edition Citrix Access Gateway Enterprise Edition Citrix Access Gateway Plugin for Windows User Guide Citrix Access Gateway 8.1, Enterprise Edition Copyright and Trademark Notice Use of the product documented in

More information

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0

Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 PN: 12199694 Getting Started Guide for Symantec On-Demand Protection for Outlook Web Access 3.0 The software described

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.

VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware. VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.com) Copyright 2008 EMC Corporation. All rights reserved. Agenda

More information

Secure Access Using VPN

Secure Access Using VPN Secure Access Using VPN WHAT IS CISCO SSL VPN? Cisco is the brand name of the VPN appliance (hardware). The SSL VPN stands for Secure Sockets Layer Virtual Private Network. SSL VPN is a service that allows

More information

Cisco ASA 5500 Series Enterprise Editions Solution Overview

Cisco ASA 5500 Series Enterprise Editions Solution Overview Cisco ASA 5500 Series Enterprise Editions Solution Overview Thomas Krewedl Systems Engineer tkrewedl@cisco.com 1 Agenda Positioning Firewalling IDS/IPS Anti-x (Trendmicro) IPSEC / SSL VPN Pricing Modelle

More information

Maximize your Remote Desktop Services

Maximize your Remote Desktop Services Maximize your Remote Desktop Services White paper Parallels An Overview of Remote Desktop Services Virtualization has added new issues to information technology. Today, businesses look not only at optimizing

More information

Receptionist-Small Business Administrator guide

Receptionist-Small Business Administrator guide Receptionist-Small Business Administrator guide What is it? Receptionist-Small Business works with your desk phone, soft phone, or mobile device so you can control calls, monitor the lines of employees,

More information

Cisco Adaptive Security Appliances and Citrix NetScaler Gateway citrix.com

Cisco Adaptive Security Appliances and Citrix NetScaler Gateway citrix.com Cisco Adaptive Security Appliances and NetScaler Gateway 2 Contents What You Will Learn...3 Cisco ASA SSL VPN...4 NetScaler Gateway...5 HDX SmartAccess...6 HDX Insight...6 Combining Cisco ASA and NetScaler

More information

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

SSL VPN vs. IPSec VPN

SSL VPN vs. IPSec VPN SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Websense Support Webinar: Questions and Answers

Websense Support Webinar: Questions and Answers Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user

More information

To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:

To participate in the hands-on labs in this class, you need to bring a laptop computer with the following: Course: Deploying Cisco ASA VPN Solutions Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Learning Credits: 35 Description: The Deploying Cisco ASA VPN Solutions (VPN) v2.0 course is a

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information