The Need for Secure Remote Access
Telecommuters, regional salespeople, satellite and branch offices, and business partners are just a few groups who may need remote access to a corporation’s resources. Each group needs access, but the requirements are very different.
- Dedicated,always-on connection
- Standards based
- Complex to implement [Need a client software]
- Performance constraints
- Access problems [require UDP Ports to open]
- No Detailed logging.
- Simple to deploy
- High Performance
- Uses well-known technologies
- Event Log, User Access log and Admin Access Log
- Not an always-on connection
How SSL VPNs Work
The communications tunnel allows communications between two computers over public networks securely so that other computers on those networks cannot access the communications between the two machines.
Tunneling involves encrypting all communications between the two computers so that even if another computer were to receive the communications, it would not be able to decipher the contents of the actual message between the machines
SSL VPNs create secure tunnels by performing two functions:
- Requiring authentication from users before allowing access so that only authorized parties can establish tunnels
- Encrypting all data transmitted to and from the user by implementing the actual tunnel using SSL
The process of establishing an SSL tunnel requires exchange of different configuration information between the computers on either end of the connection. The technical details related to communication and encryption protocols, key exchange.
Historically, VPN tunneling was typically performed at the Network Layer or lower. SSL VPNs work differently. They establish connectivity using SSL, which functions at Levels 4-5. They also encapsulate information at Levels 6-7 and communicate at the highest levels in the OSI model.