Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
SSL VPN : Understanding, evaluating and planning secure, web-based remote access

You're reading from   SSL VPN : Understanding, evaluating and planning secure, web-based remote access Understanding, evaluating and planning secure, web-based remote access

Arrow left icon
Product type Paperback
Published in Mar 2005
Publisher Packt
ISBN-13 9781904811077
Length 212 pages
Edition 1st Edition
Tools
Arrow right icon
Toc

Table of Contents (14) Chapters Close

SSL VPN
Credits
About the Authors
1. Introduction
1. Introduction to SSL VPN 2. SSL VPN: The Business Case FREE CHAPTER 3. How SSL VPNs Work 4. SSL VPN Security 5. Planning for an SSL VPN 6. Educating the User 7. Legacy Data Access 8. The Future of SSL VPN Technology A Review of TCP, IP, and Ports SSL VPN Gateways

IPsec Vs. SSL VPN


Most IPsec VPNs will use custom software at each of the end points—the hub device and client. If you think about this for a bit then you will see that this process provides a high level of security. Each end point requires some type of setup steps, potentially adding more human intervention into the process.

The SSL VPN normally will not require any special client software. The overall security is the same as that of the IPsec solution. As far as setup goes, if the browser is up-to-date then the process is automatic.

Both IPsec and SSL VPNs can provide enterprise-level secure remote access. Both these technologies support a range of user authentication methods, including X.509 certificates. IPsec overall is more vulnerable to attack, unless certificates are used. SSL Web servers always authenticate with digital certificates, even in the one-way based authentication that native SSL uses. SSL will determine if the target server is certified by any of the CAs. SSL provides better flexibility in cases where trust is limited or where it is difficult (or unwise) to install user certificates (for example, on public computers)

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image