FREE Delivery in the UK.
Only 1 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Juniper(r) Networks Secur... has been added to your Basket
Condition: Used: Good
Comment: Used Good condition book may have signs of cover wear and/or marks on corners and page edges. Inside pages may have highlighting, writing and underlining. All purchases eligible for Amazon customer service and a 30-day return policy.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Juniper(r) Networks Secure Access SSL VPN Configuration Guide Paperback – 1 Dec 2007

3 out of 5 stars 2 customer reviews

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
"Please retry"
£27.58 £2.03
Note: This item is eligible for click and collect. Details
Pick up your parcel at a time and place that suits you.
  • Choose from over 13,000 locations across the UK
  • Prime members get unlimited deliveries at no additional cost
How to order to an Amazon Pickup Location?
  1. Find your preferred location and add it to your address book
  2. Dispatch to this address when you check out
Learn more
£40.99 FREE Delivery in the UK. Only 1 left in stock (more on the way). Dispatched from and sold by Amazon. Gift-wrap available.

Frequently Bought Together

  • Juniper(r) Networks Secure Access SSL VPN Configuration Guide
  • +
  • Configuring Juniper Networks NetScreen and SSG Firewalls
Total price: £72.98
Buy the selected items together

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your e-mail address or mobile phone number.

Product details

  • Paperback: 608 pages
  • Publisher: Syngress; 1 edition (1 Dec. 2007)
  • Language: English
  • ISBN-10: 1597492000
  • ISBN-13: 978-1597492003
  • Product Dimensions: 19.1 x 3.1 x 23.5 cm
  • Average Customer Review: 3.0 out of 5 stars  See all reviews (2 customer reviews)
  • Amazon Bestsellers Rank: 797,545 in Books (See Top 100 in Books)

Product Description

About the Author

Rob Cameron (JNCIS-FWV, JNCIA-M, CCSP, CCSE+) is a Security Solutions Engineer for Juniper Networks. He currently works to design security solutions for Juniper Networks that are considered best practice designs. Rob specializes in network security architecture, firewall deployment, risk management, and high-availability designs. His background includes five years of security consulting for more than 300 customers. This is Rob's second book; the previous one being Configuring NetScreen Firewalls (ISBN: 1-932266-39-9) published by Syngress Publishing in 2004. Neil R. Wyler (JNCIS-FWV, JNCIA-SSL) is an Information Security Engineer and Researcher located on the Wasatch Front in Utah. He is the co-owner of two Utah-based businesses, which include a consulting firm with clients worldwide and a small software start-up. He is currently doing contract work for Juniper Networks, working with the company's Security Products Group. Neil is a staff member of the Black Hat Security Briefings and Def Con hacker conference. He has spoken at numerous security conferences and been the subject of various online, print, film, and television interviews regarding different areas of information security. He was the Lead Author and Technical Editor of Aggressive Network Self-Defense (Syngress, 1-931836-20-5) and serves on the advisory board for a local technical college.

Inside This Book

(Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

3.0 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See both customer reviews
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback Verified Purchase
This is a great book if you wish to learn the design, configuration and troubleshooting of the SA Series. A good study guide also for the Juniper JNCIA courses / Present equivalent
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
I have only just received the book and already I'm disappointed.
I bought the book as a reference work, not for any freebie "BOGOF" offers, and on that score it looks as close as an original reference work is likely to be.

However, I take great exception to a big banner across the front of any product which says "Free xxx" and that's the only reference to it in the entire product. No further info, no indication of a code or key or website to enter it. Just a scam, a pointless disappointing scam.

Hence one star.
Book might be OK, but the cover has really upset me, please someone tell these guys to stop doing it!
Comment 0 of 1 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Helpful Customer Reviews on (beta) HASH(0x9b1ad0d8) out of 5 stars 4 reviews
5 of 6 people found the following review helpful
HASH(0x9bbc5504) out of 5 stars Comments from the Author 24 Dec. 2007
By Neil R. Wyler - Published on
Format: Paperback
So I realize my rating is a little biased, but I had some things to say and I couldn't find a place for an author to leave their remarks, so here they are. If you could pick a rating that didn't count I would have done that, but alas you can not, and I'm not going to ding myself or my co-authors for that.

First, if you're looking at buying this book, or have already purchased this book, then I'd like to say thank you. So, Thank You. I hope you enjoy the book and I hope you find what you're looking for inside its pages.

Let me start off by saying that as the title states, this is a configuration guide. It always bothers me when I see someone review a book complaining about how some of the information is too basic. This book is meant to be a guide for beginners to experts, it will obviously cover some things that are basic but hopefully has enough advanced material to keep seasoned users happy as well.

To the beginners, you're going to love it. I would have loved to have had this book when I first started working with this device, which is why this book exists now; I couldn't find what I needed, so I got a few friends together and we did something about that. It covers everything you need to hit the ground running and walks you through how to do it. We've got enough screenshots in here that you should be able to find any menu you're looking for or just verify that you're on the right screen when you see it.

To the experts, you should enjoy this too. Hey, we all love the Admin Guide that Juniper provides us with, but lets be honest, it's unbelievably huge and can sometimes be a little hard to understand. This book puts things in plain English and explains them so you only have to read them once, not ten times, before you get the "Aha!" you're looking for. It should also be a great quick reference guide for you when you can't recall how to configure something, though you've done it a thousand times. And last, but certainly not least, you can hand it to the new guy and tell him to read it rather than having to explain everything to him.

Now of course a book wouldn't be a book without errors, and we have ours too. Does this bother me? Yes. Does this make me insane? You bet. Is this a reality of the publishing world? I'm quickly learning that it is.

Chapter 1 is "Defining a Firewall". What the heck is a firewall chapter doing as Chapter 1 of a VPN book? I asked the same question, nay, I yelled it at the top of my lungs(Though my language was more colorful). This chapter was used by the publisher as a placeholder for the original Chapter 1 material, which is the current Introduction. Somewhere in the formation of the book, as the deadlines loomed and were surpassed(Sorry about that pre-orderers), things were getting rushed to the printer and the placeholder ended up more than just a placeholder. I assumed(Silly me) as the book went to print that this was not the case. So what does this mean?

It means there's extra information in the book that doesn't exactly fit its theme. Is this bad information? Not at all, the chapter is sound information, it just doesn't quite belong, and in future revisions of the book it will not be there. I think the current Introduction of the book does a far better job of introducing it, and in future prints will take the place of Chapter 1.

I want to stress that the rest of the book is SOLID! We work with these devices every day, many of us at Juniper Networks, or working directly for Juniper Networks. Will this book have everything you want? I hope so, I sincerely do. If it doesn't, I'm sorry, all I can say is drop me a line and we'll see what we can do in the Second Edition. So thanks again for reading our book, and thank you for taking the time to read my comments as well.
3 of 3 people found the following review helpful
HASH(0x9bbc5564) out of 5 stars Excellent book, a must for any Juniper SA installation. 26 July 2008
By J. Armenteros - Published on
Format: Paperback Verified Purchase
This is an excellent book. It provides a lot of helpful information on how to set up a Juniper SA appliance. The information in this book has helped us organize the user and resource profiles in our installation, as well as set up remote access to Citrix applications. I recommend this book to anyone setting up or administering a Juniper Secure Access SSL VPN.
1 of 1 people found the following review helpful
HASH(0x9bceb090) out of 5 stars Very useful book. 22 May 2008
By Daniel J. Smart - Published on
Format: Paperback Verified Purchase
I've read the book a couple of times now, and find it very helpful. The book is filled with good advice. I would have found it more useful if it had more suggestions and best practices, instead of just explaining the various options. I found the Terminal Services and Citrix chapter very confusing. The most transparent way to run Citrix under windows is using the CTS service with a Resource Profile when running with a Citrix Web Interface server. For Mac, I find running Network Connect with an limited ACL to allow running directly with the Citrix Web Interface works best. It would be helpful to give some "best practices" of when to use each deployment method.

One area that took a while for me to understand was executing Host Checker policies in the realm. Page 89 doesn't stress this, but you MUST "Evaluate Policy" in the realm to use that policy in a role. I found it much better to enforce a HC policy in the role, NOT in the realm. This is especially true if you have multiple realms on a signin page. Getting remediation to work the way you want it to is not trivial.

The authentication section was very good. Missing was information on properly setting up LDAP group settings such as recommended setting of Reverse Group Search and Nested Group Level. JTAC suggested turning off Reverse Search and maxing nesting between 5 and 7 but no more than 7. The whole thing with the Server Catalog is confusing and could be explained.

Finally, I would have liked a lot more emphasis on User Session Policy Tracing, and more real life suggestions on what to look for. Also, I have never successfully used Simulation in a meaningful way. If it is useful, examples of how to set it up would be helpful.

Again, a very useful book with a lot of great info. I'd just like to see a little more "Cookbook" style examples of real world setup issues.

HASH(0x9ba5fc90) out of 5 stars Great Reference Guide 7 Dec. 2009
By James Oryszczyn - Published on
Format: Paperback Verified Purchase
If you are looking for a book that will help you configure the Juniper SA appliance very quickly, this is the book. It very easy to follow with great examples.
Were these reviews helpful? Let us know