Summary
In this chapter, we have explored SSL VPN security. We discussed:
Authentication, Authorization, and Single Sign On
End-Point Security Concerns
Trusted Endpoints and Tiered Access
Server-Side Security Issues
The need of patching for SSL VPN servers to remain resilient to attack
Whether Windows or Linux is a more suitable SSL VPN server platform
Some other miscellaneous topics related to SSL VPN security
In the next chapter, we will discuss how to plan for an SSL VPN implementation. We will cover the items to be considered before selecting a product, as well as how to prepare your IT infrastructure for the inclusion of SSL VPN technology.