Novell Access Manager SSL Virtual Private Network
|
|
|
- Beverly McDaniel
- 9 years ago
- Views:
Transcription
1 White Paper Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance
2 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server... 5 Access Gateway... 5 SSL VPN... 6 SSL VPN Features... 7 Clientless Access... 7 Client Integrity Check... 7 Access Control... 9 Security... 9 Applications... 9 Management... 9 Auditing... 9 High Availability Inactivity Time-Out...10 Keep-Alive Platforms Remote OS Supported SSL VPN Feature List Frequently Asked Questions Do I need to keep the browser open after connecting to the Novell Access Manager SSL VPN Gateway?...13 Is split tunneling supported with the Novell Access Manager SSL VPN?...13 Can I create site-to-site VPN tunnels with the Novell Access Manager SSL VPN? Can Non-administrators on Windows connect to the Novell Access Manager SSL VPN?...13 How secure is the Novell Access Manager SSL VPN?...13 Can I use Microsoft Java with Novell Access Manager SSLVPN? What are the applications that can be accessed through Novell Access Manager SSL VPN?...13 p. 2
3 3 N O V E L L S S L V P N Product Overview With more and more individuals working outside traditional office settings, the need for secure remote access to corporate resources has become more important than ever. No matter where the users are whether traveling nationally or internationally, working from home or on site at a partner location they should be able to access corporate resources without compromising security. The Novell Access Gateway SSL VPN (Secure Socket layer Virtual Private Network) is the product that allows secure anywhere-, anytime-access. Novell's SSL VPN is a new type of VPN based on the secure sockets layer (SSL) protocol used in e-commerce. SSL has been traditionally and widely deployed for securing web-based applications in the form of HTTPS. SSL is embedded in most IP stacks and occupies the architectural base of the application layer. Utilizing existing infrastructure, SSL VPNs are economical and offer a simple and easy experience for employees and business partners. The Novell Access Manager SSL VPN is designed to provide secure access to non-http based applications inside a corporate network. It is combined with the powerful identity services of the Novell Access Manager in order to provide authentication and policy-controlled access to enterprise resources. Novell Access Manager supports industry-leading standards such as Liberty Alliance, WS-Security, and the Security Assertions Markup Language (SAML). The Novell SSL VPN consists of an SSL VPN Gateway accelerated by reverse proxy and an Identity Server. The following figure shows these components: Illustration 1: Functioning of SSL VPN p. 3
4 4 Identity Server Access Gateway SSL VPN The Identity Server provides authentication services for all Novell Access Manager 3 components in addition to providing provider and consumer services for Liberty Alliance and SAML (1.1 and 2.0) requests. As with all Novell Access Manager 3 components, the Identity Server provides authentication services according to the Access Manager Policy specifications (see other Novell Access Manager 3 white papers in this series for more information). The Identity Server is responsible for authenticating users and providing policy-constrained role information to facilitate authorization decisions. The Identity Server also provides the full Liberty Alliance Web Service Framework to federate identity information. In addition to the standard Liberty Alliance Employee and Personal profiles, the Identity Server allows custom attributes to be defined, mapped and used in policy enforcement. One additional technology that the Identity Server facilitates is Federated Provisioning, which automatically creates user accounts during a federation request. Without this feature, users would need to register (create a user account) with a Service Provider before they federate their identity. The Access Gateway is the HTTP proxy component of Novell Access Manager. In addition to providing the award-winning Novell security and proxy services (authorization, single signon and data encryption), it is also integrated with the new identity, role and policy services of the Novell Access Manager. The Access Gateway provides the ability to transform Identity Provider authentication and services into standard web headers, form fill-in responses, and basic authentication responses; meaning that existing web applications may support the new identity standards without change. An example of the support for new identity services, is the policy-enabled Identity Injection feature of the Access Gateway 1 which leverages the Liberty Alliance Web Services Framework, to extract identity information and inject a higher-quality identity into web headers or query strings. Traditional IPSec solutions require client software to secure the transactions and lack granularity the administrators require, to provide appropriate access to users. Novell's SSL VPN reduces the task of deploying and managing the client solutions (e.g., IPSec) thereby reducing the overall cost. The SSL VPN can also be used on machines which are not owned by the user and not managed by corporate. Novell's SSL VPN is a Linux-based service and is accelerated by either the Linux Access Gateway or NetWare Access Gateway. After successful authentication of the user, the 1 Formerly known as OLAC (Object Level Access Control) p. 4
5 5 identity information is exchanged between the Access Gateway and SSL VPN, after which a Java agent/activex agent is delivered to the client. This agent establishes a secure SSL tunnel providing access to different applications as determined by policy and user/resource role. The following figure shows the SSL VPN client Interface: Illustration 2: SSL VPN User Interface p. 5
6 6 S S L V P N F E A T U R E S Clientless Access Client Integrity Check Novell SSL VPN is a clientless application and supports any Web browser as client. It provides access from any location, including behind a network address translation (NAT) firewall. This increases the number of points from where employees, partners, and customers can access remote network data. Clientless access simplifies the connection process for users as they do not have to install a client. It also simplifies the IT administrators' job as there is no need to configure and manage the client. Novell SSL VPN handles authentication, encryption, authorization, and session cleanup activities. The user will not see any change in applications accessed through the SSL VPN. The service is available to all users irrespective of whether root or non-root in Linux/Mac* or administrator or non-administrator in Windows*. As the user has the flexibility of using SSL VPN from any unmanaged device, there is a risk of client device compromise which can result in an undesirable damage to the corporate network through the SSL VPN tunnel. The Client Integrity Check feature of Novell's SSL VPN verifies the integrity of the client device before establishing the session. A users' workstation is verified for current and running antivirus services, firewalls, or other software, specified in the Client Integrity Check Policy, before a connection is established. Once the session is established, client integrity checks are carried out during the session to ensure that if any antivirus or firewall application running in the workstation is stopped, it is detected and the SSL VPN session is terminated. The Novell SSL VPN provides built-in templates to use standard software such as Zone Alarm and Symantec. Administrator can decide on the list of softwares and configure them in the server accordingly. The following figure shows a sample list of software configured: p. 6
7 7 Illustration 3: Configuring Client Integrity Check Policy p. 7
8 8 A C C E S S C O N T R O L Security Applications Management Auditing Simultaneously accommodating the varying needs of remote workers and ensuring data confidentiality, the SSL VPN provides access to authorized users based on their roles (such as manager, engineer or finance) and the roles of the resource. Roles can be changed or assigned to new users/resources without modifying existing access policies. Advanced access control provides administrators with the tools to easily set individual access privileges based on applications, networks or hosts. Users may be presented with a list of applications that can be accessed during the session. Novell's Access Manager SSL VPN makes minimal use of client computer resources and does not store any sensitive information remotely. All certificate associations to the SSL VPN are easily configured via the Access Manager administration console. Security options include: Encryption 256-bit or 128-bit AES encryption Integrity: Hash SHA; Authentication Username/Password (such as Active Directory or Novell edirectory); With an SSL VPN connection established, users can access authorized application servers using the standard client applications rather than being required to use web-based application clients. These standard client applications include: Client/server TCP applications, such as Microsoft* Outlook, Microsoft* Windows Terminal Services, Citrix* MetaFrame* applications, Novell Groupwise, TELNET, SSH, Passive FTP UDP-based services such as DNS, SNMP The Novell Access Manager SSL VPN is configured and monitored using the Access Manager 3 administration console. Operational statistics, alerts and health checkup features provide NOC personnel all necessary administration tools. Newly installed Access Manager SSL VPNs are automatically discovered and integrated into the administration console as are any configuration modifications that are made using the command-line interface (CLI). Further, the Novell SSL VPN Gateway can operate behind a NAT. p. 8
9 9 High Availability Inactivity Time-Out Keep-Alive Novell SSL VPN is integrated with Novell Audit and Sentinel to provide comprehensive details about SSL VPN sessions, SSL VPN Gateway activities and much more. The Novell Access Manager SSL VPN can be configured for high availability which makes the SSL VPN service available all the time. Administrator can configure more than one SSL VPN Gateway to service client requests in a round robin fashion. Sessions are automatically terminated if connection activity is quiescent for a configurable amount of time. Similar to the inactivity time-out, SSL VPN sessions are advised of the continued operation of both the user and gateway side via keep-alive packets. If these packets are not received for a configurable amount of time then the session is terminated. p. 9
10 10 P L A T F O R M S Remote OS Supported Users can access the Novell Access Manager SSL VPN Gateway from a Windows, Linux or MAC based system. A thin ActiveX client is downloaded if the browser is Microsoft Internet Explorer, otherwise, a thin Java client is downloaded. Microsoft Windows 2000 with SP4 Microsoft Windows XP with SP2 RedHat Linux 9.x Novell Linux Desktop SUSE 9.x SLED 10.x S S L V P N F E A T U R E L I S T Client Integrity Checks for antivirus, firewall Checks done throughout the session Template available for standard antivirus and firewalls Option to verify software installation Operating Systems supported for VPN client Windows Linux Macintosh Granular Access Policies Inactivity Timeout Management Interface Windows Agent Java Agent Networks, protocols, service (such as FTP Telnet), port Default 30 min, configurable. Device Manager, centralized configuration. Signed ActiveX control and Java applet. Signed Java applet. p. 10
11 11 F R E Q U E N T L Y A S K E D Q U E S T I O N S Do I need to keep the browser open after connecting to the Novell Access Manager SSL VPN Gateway? Yes, The browser needs to be kept open. You can minimize the browser and use the applications to connect to the protected network. Is split tunneling supported with the Novell Access Manager SSL VPN? Yes, Split Tunneling is supported. Can I create site-to-site VPN tunnels with the Novell Access Manager SSL VPN? No, you cannot create site-to-site VPN tunnels with the Novell Access Manager SSLVPN. Can Non-administrators on Windows connect to the Novell Access Manager SSL VPN? Yes, non-administrators can connect to the SSL VPN gateway using Firefox or any other browsers that supports JRE. Non-administrators or users with no administrative privilege cannot use Internet Explorer to connect to the SSL VPN Gateway as the Activex controls require administrative privilege. How secure is the Novell Access Manager SSL VPN? Novell Access Manager SSLVPN uses SSL to communicate between the clients and the server. Others cannot get the contents of the information transferred between the clients and the server, even if they get the network packets. The Inactivity Timeout feature ensures that the session is logged out if no information is passed between the client and the server for a configured time. User sessions are authenticated and cookies are cleaned up after logout. No traces of the session are left behind in the client machine after logout. Can I use Microsoft Java with Novell Access Manager SSLVPN? No. The Novell Access Manager SSL VPN supports only Sun Java. What are the applications that can be accessed through Novell Access Manager SSL VPN? Ideally you can access all TCP and UDP application. For more information on list of applications tested on SSL VPN, refer to the documentation. p. 11
12 12 Contact your local Novell Solutions Provider, or call Novell at: US/Canada Worldwide Facsimile Novell, Inc. 404 Wyman Street Waltham, MA USA 08/06 Novell, Inc. All rights reserved Novell, Inc. All rights reserved. Novell, the Novell logo, the N logo, NetWare, SUSE and ZENworks are registered trademarks, and edirectory and Sentinel are trademarks of Novell, Inc. in the United States and other countries. *Linux is a registered trademark of Linus Torvalds. All other third-party trademarks are the property of their respective owners. p. 12
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013
SSL VPN Server Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
SSL VPN Server Guide. Access Manager 4.0. November 2013
SSL VPN Server Guide Access Manager 4.0 November 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module
Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common
Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4)
Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets
Citrix Access on SonicWALL SSL VPN
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6)
Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets
SSL-Based Remote-Access VPN Solution
Cisco IOS SSL VPN SSL-Based Remote-Access VPN Solution Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity integrated
Novell Access Manager
Access Gateway Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 November 16, 2010 www.novell.com Novell Access Manager 3.1 SP2 Access Gateway Guide Legal Notices Novell, Inc., makes no representations
Citrix Access Gateway
F E A T U R E S O V E R V I E W Citrix Access Gateway Citrix Access Gateway is a universal SSL VPN appliance that combines the best features of IPSec and typical SSL VPNs without the costly and cumbersome
Java Secure Application Manager
Java Secure Application Manager How-to Introduction:...1 Overview:...1 Operation:...1 Example configuration:...2 JSAM Standard application support:...6 a) Citrix Web Interface for MetaFrame (NFuse Classic)...6
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : 920-440 Title : nncde wireless lan Version : DEMO 1. A customer wants to access the Microsoft Outlook Web Access application through
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
SSL VPN User Guide. Access Manager 4.0. November 2013
SSL VPN User Guide Access Manager 4.0 November 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
Secure remote access to your applications and data. Secure Application Access
Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network
SSL VPN. Virtual Private Networks based on Secure Socket Layer. Mario Baldi. Politecnico di Torino. Dipartimento di Automatica e Informatica
SSL VPN Virtual Private Networks based on Secure Socket Layer Mario Baldi Politecnico di Torino Dipartimento di Automatica e Informatica mario.baldi[at]polito.it staff.polito.it/mario.baldi Nota di Copyright
Licenses are not interchangeable between the ISRs and NGX Series ISRs.
Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled
Securing Citrix with SSL VPN Technology
Securing Citrix with SSL VPN Technology An AEP Networks Solution Summary For years, Citrix Systems has dominated the server-based computing market as the solution of choice for application access across
Aventail SSL VPN. Installation and Administration Guide. Version 9.0.0
Aventail SSL VPN Installation and Administration Guide Version 9.0.0 2008 SonicWALL, Inc. All rights reserved. SonicWALL is a registered trademark of SonicWALL, Inc. Other product names mentioned herein
Novell Access Manager
J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
Introducing ZENworks 11 SP4. Experience Added Value and Improved Capabilities. Article. Article Reprint. www.novell.com. Endpoint Management
Introducing ZENworks 11 SP4 Experience Added Value and Improved Capabilities Article Article Reprint Endpoint Management Endpoint Management Article Introducing ZENworks 11 SP4 Addressing Key Usability
Barracuda SSL VPN Administrator s Guide
Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,
Why SSL is better than IPsec for Fully Transparent Mobile Network Access
Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. [email protected] What are we all trying to achieve? Fully transparent network access
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
How To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
Dell SonicWALL SRA 7.5 Citrix Access
Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about
SSL VPN A look at UCD through the tunnel
SSL VPN A look at UCD through the tunnel Background Why? Who is it for? Stakeholders IET Library Schools and Colleges Key Requirements Integrate with existing authentication Flexible security groups within
Virtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
App Orchestration 2.0
App Orchestration 2.0 Configuring NetScaler Load Balancing and NetScaler Gateway for App Orchestration Prepared by: Christian Paez Version: 1.0 Last Updated: December 13, 2013 2013 Citrix Systems, Inc.
Release Notes for Version 1.5.207
Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4
Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details
ZENworks 11 SP3 System December 2014 The following sections provide the Novell ZENworks 11 SP3 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on
Exhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
Remote Filtering Software
Remote Filtering Software Websense Web Security Websense Web Filter v7.5 1996 2010, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2010 The products and/or
Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK
Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
Clientless SSL VPN End User Set-up
37 CHAPTER This ections is for the system administrator who sets up Clientless (browser-based) SSL VPN for end users. It summarizes configuration requirements and tasks for the user remote system. It also
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners
Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity
USER GUIDE. FortiOS v3.0 MR7 SSL VPN User Guide. www.fortinet.com
USER GUIDE FortiOS v3.0 MR7 SSL VPN User Guide www.fortinet.com FortiGate v3.0 MR7 SSL VPN User Guide 18 July 2008 01-30007-0348-20080718 Copyright 2008 Fortinet, Inc. All rights reserved. No part of this
AnyConnect VPN Client FAQ
AnyConnect VPN Client FAQ Document ID: 107391 Questions Introduction What level of rights is required for the AnyConnect client? Is a reboot required after AnyConnect is installed/upgraded? Is it possible
Proof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Novell Access Manager
Novell Access Manager Product Overview Kiran Mova Agenda Introduction Architecture IDP AG SSL VPN Administration Console How it works? Web SSO Federation SSO Protect HTTP Resources Protect non-http Resources
Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners
Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity
Administration Quick Start
www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
Remote Management Reference
www.novell.com/documentation Remote Management Reference ZENworks 11 Support Pack 2 October 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................
What s New in Juniper s SSL VPN Version 6.0
What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper
Novell. Open Enterprise Server. vs. Microsoft * Windows * Server 2003: A Total Cost of Ownership Study for NetWare Customers. www.novell.
Novell Open vs. Microsoft * Windows * : A Total Cost of Ownership Study for NetWare Customers WHITE PAPER www.novell.com 2 Novell Open Overview In March 2005, Novell shipped the first release of Novell
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
RELEASE NOTES. Release Notes. Introduction. Platform. Product/version/build: Remote Control 11.00 (2012027) ActiveX Guest 11.
Release Notes Product/version/build: Remote Control 11.00 (2012027) ActiveX Guest 11.00 (2012027) Shipping date: RELEASE NOTES 30 th January 2012 Introduction These release notes contain information relating
CISCO REMOTE ACCESS VPN SOLUTIONS
CISCO REMOTE ACCESS VPN SOLUTIONS Remote Connectivity for Any Deployment Scenario Sami Iivarinen Systems Engineer Cisco Systems Finland 1 Agenda Solution Overview Cisco WebVPN SSL VPN Connectivity 2 Cisco
To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:
Course: Deploying Cisco ASA VPN Solutions Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Learning Credits: 35 Description: The Deploying Cisco ASA VPN Solutions (VPN) v2.0 course is a
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Integrated Citrix Servers
Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights
SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
SSL VPN User Guide. Access Manager 3.2 SP2. June 2013
SSL VPN User Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
Installation Guide Access Manager 4.0 SP2
Installation Guide Access Manager 4.0 SP2 June 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
2003, Rainbow Technologies, Inc.
Expertise Corporate 25 Years of Security SMB to Fortune 30 Access Control 28 Million Hardware Keys 50% Token market share 6 Years of ikey Web Security 10 Years of SSL Secure > 50% of the Data NetSwift
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills
Novell Access Manager
Administration Console Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 November 16, 2010 www.novell.com Novell Access Manager 3.1 SP2 Administration Console Guide Legal Notices Novell, Inc.,
Sophos UTM. Remote Access via SSL. Configuring UTM and Client
Sophos UTM Remote Access via SSL Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
Configuring Global Protect SSL VPN with a user-defined port
Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] Global Protect SSL VPN Overview This document gives you an overview on how to configure
Installing Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip
Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure
Technical White Paper DESKTOP www.novell.com Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure * Using SUSE Linux Enterprise Desktop with Microsoft Active Directory Infrastructure
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
2 Downloading Access Manager 3.1 SP4 IR1
Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Juniper SSL VPN Notes Page 1
Juniper SSL VPN Notes Page 1 The Juniper SSL VPN is a full-featured appliance using SSL protocol to allow remote computers to securely access our organization s resources with a standard browser. The types
Remote Filtering. Websense Web Security Websense Web Filter. v7.1
Remote Filtering Websense Web Security Websense Web Filter v7.1 1996 2009, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2009 Printed in the United States
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
Introducing ZENworks 11 SP4
Introducing ZENworks 11 SP4 Experience Added Value and Improved Capabilities Article Reprint ZENworks Article Reprint Introducing ZENworks 11 SP4 Addressing Key Usability and Supportability Issues Micro
SAML 2.0 SSO Deployment with Okta
SAML 2.0 SSO Deployment with Okta Simplify Network Authentication by Using Thunder ADC as an Authentication Proxy DEPLOYMENT GUIDE Table of Contents Overview...3 The A10 Networks SAML 2.0 SSO Deployment
