Show simple item record

dc.contributor.authorSomboonpattanakit, Chavalit
dc.date.accessioned2013-05-30T08:28:27Z
dc.date.available2013-05-30T08:28:27Z
dc.date.issued2013-05-30
dc.identifier.urihttp://repository.rmutp.ac.th/handle/123456789/1128
dc.descriptionThis guide describes basic configuration procedures for Juniper Networks Secure Access Secure Access Service. This document was formerly titled Secure Access Administration Guide. This document is now part of the Junos Pulse documentation set. This guide is designed for network administrators who are configuring and maintaining a Juniper Networks Secure Access Service device. To use this guide, you need a broad understanding of networks in general and the Internet in particular, networking principles, and network configuration. Any detailed discussion of these concepts is beyond the scope of this guide.en_US
dc.description.abstractThe Juniper Networks Secure Access Service enable you to give employees, partners, and customers secure and controlled access to your corporate data and applications including file servers, Web servers, native messaging and e-mail clients, hosted servers, and more from outside your trusted network using just a Web browser. Secure Access Service provide robust security by intermediating the data that flows between external users and your company’s internal resources. Users gain authenticated access to authorized resources through an extranet session hosted by the appliance. During intermediation, Secure Access Service receives secure requests from the external, authenticated users and then makes requests to the internal resources on behalf of those users. By intermediating content in this way, Secure Access Service eliminates the need to deploy extranet toolkits in a traditional DMZ or provision a remote access VPN for employees. To access the intuitive Secure Access Service home page, your employees, partners, and customers need only a Web browser that supports SSL and an Internet connection. This page provides the window from which your users can securely browse Web or file servers, use HTML-enabled enterprise applications, start the client/server application proxy, begin a Windows, Citrix, or Telnet/SSH terminal session, access corporate e-mail servers, start a secured layer 3 tunnel, or schedule or attend a secure online meeting.en_US
dc.language.isoen_USen_US
dc.subjectjuniperen_US
dc.subjectvpnen_US
dc.subjectsslvpnen_US
dc.subjectnetworken_US
dc.subjectsecureen_US
dc.subjectsecurityen_US
dc.subjectadminen_US
dc.subjectguideen_US
dc.subjectmanualen_US
dc.subjectdocumentationen_US
dc.titleJunos Pulse Secure Access Service Administration Guideen_US
dc.typeBooken_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record