10.02.2013 Views

Juniper Networks Secure Access Administration Guide

Juniper Networks Secure Access Administration Guide

Juniper Networks Secure Access Administration Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

What can I do with the IVE?<br />

Chapter 2: Introduction to the IVE<br />

The IVE offers a wide variety of features that you can use to secure your company’s<br />

resources and easily maintain your environment. The following sections answer<br />

questions you may have about the IVE’s security and management capabilities:<br />

� “Can I use the IVE to secure traffic to all of my company’s applications, servers,<br />

and Web pages?” on page 25<br />

� “Can I use my existing servers to authenticate IVE users?” on page 27<br />

� “Can I fine-tune access to the IVE and the resources it intermediates?” on<br />

page 27<br />

� “Can I create a seamless integration between the IVE and the resources it<br />

intermediates?” on page 28<br />

� “Can I use the IVE to protect against infected computers and other security<br />

concerns?” on page 29<br />

� “Can I ensure redundancy in my IVE environment?” on page 29<br />

� “Can I make the IVE interface match my company’s look-and-feel?” on page 29<br />

� “Can I enable users on a variety of computers and devices to use the IVE?” on<br />

page 30<br />

� “Can I provide secure access for my international users?” on page 30<br />

Can I use the IVE to secure traffic to all of my company’s applications, servers, and Web<br />

pages?<br />

The IVE enables you to secure access to a wide variety of applications, servers, and<br />

other resources through its remote access mechanisms. Once you have chosen<br />

which resource you want to secure, you can then choose the appropriate access<br />

mechanism.<br />

For instance, if you want to secure access to Microsoft Outlook, you can use the<br />

<strong>Secure</strong> Application Manager (SAM). The <strong>Secure</strong> Application Manager intermediates<br />

traffic to client/server applications including Microsoft Outlook, Lotus Notes, and<br />

Citrix. Or, if you want to secure access to your company Intranet, you can use the<br />

Web rewriting feature. This feature uses the IVE’s Content Intermediation Engine to<br />

intermediate traffic to Web-based applications and Web pages.<br />

What can I do with the IVE? � 25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!