How Mature are Clientless SSL VPN

نویسندگان

  • Tim Likarish
  • Eric Anholt
  • Biljana Risteska
  • Valentina Grigoreanu
  • Jens Mache
  • Chris Stevens
چکیده

A Virtual Private Network (VPN) offers a secure connection over an insecure network such as the Internet. Driven by an ever expanding mobile workforce and by the need for a cheaper alternative to private leased lines, the security community responded with a variety of VPN solutions deployed in a diverse array of software and hardware. Traditional VPNs offer good netto-net (site-to-site) connections but often require intense configuration and may have problems with NAT. In order to provide mobile users with an alternative to the configuration-intensive traditional VPN, clientless web browser based SSL VPNs were developed. The clientless SSL VPNs allow users to connect securely with only a web browser, however, at what cost?

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Geographically Secured SSL-VPN Using GPS

We are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, for critical applications, such as the military. A formal model for location-based access control is needed that increases the security of the application and ensures that the location information cannot be exploi...

متن کامل

Limitations and Differences of using IPsec, TLS/SSL or SSH as VPN-solution

Virtual private networks (VPNs) [1] [6] provide low-cost and secure access between hosts and/or networks. IPsec, TLS/SSL and SSH are popular technologies used to create VPNs. This article will point out some of the differences and limitations of using IPsec, TLS/SSL or SSH as VPN-solution.

متن کامل

Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6

A Virtual Private Network (VPN) can be defined as a way to provide secure communication between members of a group through use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. This work examines and empirically evaluates the remote access VPNs, namely Point to Point Tunneling Protocol (PPTP), Layer 2 Tunneling P...

متن کامل

Secure Network Solutions for Enterprise Cloud Services

Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IPSec, and SSL/TLS are the most widely used VPN protocols in today’s securing network solutions. However, there ar...

متن کامل

A 10 Giga VPN Accelerator Board for Trust Channel Security System

This paper proposes a VPN Accelerator Board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). TCSS supports safety communication channel between security nodes in internet. It furnishes authentication, confidentiality, integrity, and access control to security node to transmit data packets with IPsec protocol. TCSS consists of internet key exc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004