Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
SSL VPN : Understanding, evaluating and planning secure, web-based remote access

You're reading from   SSL VPN : Understanding, evaluating and planning secure, web-based remote access Understanding, evaluating and planning secure, web-based remote access

Arrow left icon
Product type Paperback
Published in Mar 2005
Publisher Packt
ISBN-13 9781904811077
Length 212 pages
Edition 1st Edition
Tools
Arrow right icon
Toc

Table of Contents (14) Chapters Close

SSL VPN
Credits
About the Authors
1. Introduction
1. Introduction to SSL VPN 2. SSL VPN: The Business Case FREE CHAPTER 3. How SSL VPNs Work 4. SSL VPN Security 5. Planning for an SSL VPN 6. Educating the User 7. Legacy Data Access 8. The Future of SSL VPN Technology A Review of TCP, IP, and Ports SSL VPN Gateways

Establishing Secure Tunnels Using SSL


Now that we understand what SSL is and how it works, let us discuss how SSL allows us to create tunnels.

Secure Tunnels

A secure tunnel between computers can best be understood as a secure channel of communication between two machines that have an insecure environment between them. The communications tunnel is like a tunnel under a river that allows automobiles to travel from point A on one side of the river to point B on the other side and prevents environmental elements like water from interfering with the traffic as shown in the following diagram:

The communications tunnel allows communications between two computers over public networks securely so that other computers on those networks cannot access the communications between the two machines.

However, unlike the example of the tunnel under the river, network tunneling does not employ a physical barrier between the two computers communicating and other machines. Rather, computer-related tunneling involves...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image