Juniper(r) Networks Secure Access SSL VPN Configuration Guide by Rob CameronJuniper(r) Networks Secure Access SSL VPN Configuration Guide by Rob Cameron

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

byRob Cameron, Neil R. WylerEditorRob Cameron

Paperback | December 4, 2007

Pricing and Purchase Info

$87.22 online 
$92.50 list price save 5%
Earn 436 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.

  • Complete coverage of the Juniper Networks Secure Access SSL VPN line including the 700, 2000, 4000, 6000, and 6000 SP.
  • Learn to scale your appliances to meet the demands of remote workers and offices.
  • Use the NEW coordinated threat control with Juniper Networks IDP to manage the security of your entire enterprise.
Rob Cameron (JNCIS-FWV, JNCIA-M, CCSP, CCSE+) is a Security Solutions Engineer for Juniper Networks. He currently works to design security solutions for Juniper Networks that are considered best practice designs. Rob specializes in network security architecture, firewall deployment, risk management, and high-availability designs. His b...
Loading
Title:Juniper(r) Networks Secure Access SSL VPN Configuration GuideFormat:PaperbackDimensions:656 pages, 9.25 × 7.5 × 0.68 inPublished:December 4, 2007Publisher:Syngress PublishingLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:1597492000

ISBN - 13:9781597492003

Look for similar items by category:

Reviews

Table of Contents

Introduction
Roles
Setup
Authentication Servers
Realms
Secure Application Manager/Terminal Services
Network Connect
Endpoint Security
Web/File Access/Telnet/SSH
Clustering
Virtual Systems
Troubleshooting