Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
SSL VPN : Understanding, evaluating and planning secure, web-based remote access

You're reading from   SSL VPN : Understanding, evaluating and planning secure, web-based remote access Understanding, evaluating and planning secure, web-based remote access

Arrow left icon
Product type Paperback
Published in Mar 2005
Publisher Packt
ISBN-13 9781904811077
Length 212 pages
Edition 1st Edition
Tools
Arrow right icon
Toc

Table of Contents (14) Chapters Close

SSL VPN
Credits
About the Authors
1. Introduction
1. Introduction to SSL VPN 2. SSL VPN: The Business Case FREE CHAPTER 3. How SSL VPNs Work 4. SSL VPN Security 5. Planning for an SSL VPN 6. Educating the User 7. Legacy Data Access 8. The Future of SSL VPN Technology A Review of TCP, IP, and Ports SSL VPN Gateways

Trusted Networks


A Trusted Network of a company is a network that the company uses to conduct its internal business. In many cases, the Trusted Network is by default defined in the organization as 'Secure'. The Trusted Network typically supports the backend systems, internal-only intranet web pages, data processing, messaging, and in some cases, internal instant messaging. In many companies the Trusted Network is allowed to interact between systems directly, without encryption. The problem with the definition above is that many assumptions are being made at these companies. A Trusted Network is not always a secure network. In fact, in many cases the Trusted Network cannot be trusted. The reason is that an internal network comprises many different networks. These include new acquisitions, old acquisitions, international access points, and even several access points to the outside world. A common practice is to define the Trusted Network as the network that internal employees use when at the office or via a secure controlled dial-in mechanism. A single access point is established to the outside world via a mechanism called the Demilitarized Zone (DMZ) .

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image