How Mature are Clientless SSL VPN
نویسندگان
چکیده
A Virtual Private Network (VPN) offers a secure connection over an insecure network such as the Internet. Driven by an ever expanding mobile workforce and by the need for a cheaper alternative to private leased lines, the security community responded with a variety of VPN solutions deployed in a diverse array of software and hardware. Traditional VPNs offer good netto-net (site-to-site) connections but often require intense configuration and may have problems with NAT. In order to provide mobile users with an alternative to the configuration-intensive traditional VPN, clientless web browser based SSL VPNs were developed. The clientless SSL VPNs allow users to connect securely with only a web browser, however, at what cost?
منابع مشابه
Geographically Secured SSL-VPN Using GPS
We are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, for critical applications, such as the military. A formal model for location-based access control is needed that increases the security of the application and ensures that the location information cannot be exploi...
متن کاملLimitations and Differences of using IPsec, TLS/SSL or SSH as VPN-solution
Virtual private networks (VPNs) [1] [6] provide low-cost and secure access between hosts and/or networks. IPsec, TLS/SSL and SSH are popular technologies used to create VPNs. This article will point out some of the differences and limitations of using IPsec, TLS/SSL or SSH as VPN-solution.
متن کاملRemote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6
A Virtual Private Network (VPN) can be defined as a way to provide secure communication between members of a group through use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. This work examines and empirically evaluates the remote access VPNs, namely Point to Point Tunneling Protocol (PPTP), Layer 2 Tunneling P...
متن کاملSecure Network Solutions for Enterprise Cloud Services
Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today’s securing network solutions. However, there ar...
متن کاملA 10 Giga VPN Accelerator Board for Trust Channel Security System
This paper proposes a VPN Accelerator Board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). TCSS supports safety communication channel between security nodes in internet. It furnishes authentication, confidentiality, integrity, and access control to security node to transmit data packets with IPsec protocol. TCSS consists of internet key exc...
متن کامل