Many SSL VPN vendors assess the security of endpoints as part of their network-admission routine, but that doesn’t mean these assessments are equivalent to NAC.
For years, there have been two traditional methods for secure remote access: IPSec and SSL VPNs. Both have been discussed in this newsletter over the years, and each has its definite strengths and weaknesses. Now, wireless LAN provider Aruba has proposed an alternative to using IPSec on the client computer that we find innovative.
We are developing a Ruby on Rails application and it is almost ready for production. We need to use SSL and https URLs rather than plain old http.The WEBrick server Rails uses is different from Apache, and we’re stuck trying to install the SSL certificate so that Ruby on Rails will use it.
I have a Web server running the Apache Web server and Apache Tomcat. The regular Apache Web server is used to forward SSL connections to Tomcat on Port 8443. Can I run Tomcat so that it will listen on the standard SSL port (443) along with the other ports it is listening on?
The BEST webcasts Network World has to offer - Available On-Demand - to keep you ahead of the curve. Featured Webcast: Policy Compliant SSL VPN Access: An Intelligent Application Gateway In three years, SSL VPNs will be the remote access method of choice, according to our featured speaker, Gartner VP Distinguished Analyst John Girard. He’ll give you a solid understanding of Intelligent Application Gateways, a combination of SSL VPN, endpoint security and application security. Learn from one of the indust
* Dr. Internet columnist Steve Blass discusses steps for creating an SSL certificate for WEBrick
* Help Desk columnist Ron Nutter compares T-1 and DSL service
If you’re in the market for SSL VPN equipment, or have even just thought about it, you should check out our insanely thorough review and testing package. We put 11 products through their paces. We checked them for everything from application interoperability to authentication to manageability. And we picked a winner.
SSL VPNs dissected
http://www.networkworld.com/reviews/2005/121905-ssl-test-intro.html?net&story=121905-ssl-test-intro
* Dr. Internet columnist Steve Blass discusses running Tomcat to listen on standard SSL port
* Help Desk columnist Ron Nutter discusses the safety of VPNs
* Dr. Internet columnist Steve Blass discusses building a tabbed interface framework for mastering CDs and DVDs containing HTML content
* Help Desk columnist Ron Nutter helps a reader troubleshoot decreased performance of a wireless router
New features from Juniper Networks are aimed at letting enterprises speed acceleration of SSL-encrypted applications and take advantage of content-distribution functions now built into the vendor’s management platform.
The VPN Consortium is offering the SSL File Access test, another test of SSL VPN gear that certifies that the equipment can access files to certain file servers.
Juniper this week extended its lineup of hardware platforms for SSL VPNs, rolling out new devices for small and midsize business and large enterprises.
Cisco is out with two patches this week, one for the Secure Shell server (SSH) implementation in its IOS software running on many of its switches and the other for its Unified Customer Voice Portal that could could be exploited to create superuser accounts. PayPal is also out with warning about potential flaws in its EV-SSL implementation, which could be exploited to steal user information.
Skimming the security headlines this week, one might think Carnegie Mellon University researchers release of the Perspectives Add-on for Firefox came in reaction to news of Firefox 3.0's handling of certain SSL certificates. That was just a somewhat happy coincidence though as the research team led by David Anderson, assistant professor of computer science at CMU, had been working on the plug-in for a good 18 months. At issue is self-signed SSL certificates and how they are handled by browsers. Some say Fi
My company is increasingly deploying SSL applications and that traffic already represents 40 percent of my network capacity. With this encrypted traffic on the rise, how can I build an effective protection against the loss of sensitive data?