Hi, Define Access Gateways? michaeldavid23 26-June-2008 01:28:27 PMComments For explanation plz visit the following link http://www.iec.org/online/tutorials/acc_gate/ Posted by Hash007 Access Gateway Standard Edition Provides Secure Remote Access Easy to Deploy While Providing Secure Application Access Citrix Access Gateway™ Standard Edition is easy to deploy, simple to manage, and the most cost-effective secure remote access solution on the market. The Access Gateway appliance is deployed in an organization’s DMZ, and secures all traffic with standards-based SSL. Remote users connect via an easy-to-use, Web-downloaded and updated client, enjoying a rich desk-like experience Access Gateway Standard Edition is available on the Access Gateway 2000 series appliance. Key Features and Benefits Best Access Experience Access Gateway Standard Edition provides users a desk-like access experience, allowing them to work the same way as in the office, minimising confusion and reducing training. When roaming or using unreliable networks, disconnected users are automatically reconnected once the network connection is restored, improving productivity and reducing user frustration. Supports all applications and protocols Users can access any application in its native form — whether client-server or web-based. Additionally, the Access Gateway supports UDP protocol based applications, such as real-time voice traffic (IP soft-phones). Administrators can provide access to all necessary IT resources without the need for custom development, webification, or the need to maintain both SSL and IPSEC VPN infrastructures. Rapid client deployment A Web distributed client allows end users to automatically download and install the Secure Access client, allowing organizations to easily and cost-effectively extend remote access to more users. Additionally, users always receive the latest client version, eliminating the need for administrators to manually update client software. Access Gateway Standard Edition supports the following client platforms: Windows 2000 Professional, Windows XP, Windows Vista and Linux. Integrated End-Point Security A combination of pre-login and continuous real-time end-point scanning ensures that end-point devices are safe to connect to the network. Secure Gateway replacement Citrix Presentation Server™ users can replace the secure gateway with Access Gateway, increasing security, extending access, and reducing costs. For more information see Secure Gateway Replacement. Industry standard security Information is kept private and protected using standards-based SSL/TLS encryption. Users are authenticated using standards such as LDAP, RADIUS, 2 factor authentication tokens and certificates. Drag and drop administration Simplified configuration with a powerful drag-and-drop interface used to define access controls and endpoint analysis. System monitoring tools provide an instant view of system activity. Policy based access Administrators define extensive Access Control Lists (ACLs) to control which network users and groups can access specific back-end resources. Posted by HamidAliKhan Allow them to access other kinds of networks (such as Asynchronous Terminal Mode (ATM) networks or Voice over IP networks) Posted by justinxavier An access gateway is a gateway between the telephony network and other networks, such as the Internet. Posted by sagitraz |
Posted: 27-June-2008 12:45:06 AM By: sagitraz An access gateway is a gateway between the telephony network and other networks, such as the Internet. | |
Posted: 27-June-2008 01:21:57 PM By: justinxavier Allow them to access other kinds of networks (such as Asynchronous Terminal Mode (ATM) networks or Voice over IP networks) | |
Posted: 13-November-2008 02:54:27 AM By: HamidAliKhan Access Gateway Standard Edition Provides Secure Remote Access Easy to Deploy While Providing Secure Application Access Citrix Access Gateway™ Standard Edition is easy to deploy, simple to manage, and the most cost-effective secure remote access solution on the market. The Access Gateway appliance is deployed in an organization’s DMZ, and secures all traffic with standards-based SSL. Remote users connect via an easy-to-use, Web-downloaded and updated client, enjoying a rich desk-like experience Access Gateway Standard Edition is available on the Access Gateway 2000 series appliance. Key Features and Benefits Best Access Experience Access Gateway Standard Edition provides users a desk-like access experience, allowing them to work the same way as in the office, minimising confusion and reducing training. When roaming or using unreliable networks, disconnected users are automatically reconnected once the network connection is restored, improving productivity and reducing user frustration. Supports all applications and protocols Users can access any application in its native form — whether client-server or web-based. Additionally, the Access Gateway supports UDP protocol based applications, such as real-time voice traffic (IP soft-phones). Administrators can provide access to all necessary IT resources without the need for custom development, webification, or the need to maintain both SSL and IPSEC VPN infrastructures. Rapid client deployment A Web distributed client allows end users to automatically download and install the Secure Access client, allowing organizations to easily and cost-effectively extend remote access to more users. Additionally, users always receive the latest client version, eliminating the need for administrators to manually update client software. Access Gateway Standard Edition supports the following client platforms: Windows 2000 Professional, Windows XP, Windows Vista and Linux. Integrated End-Point Security A combination of pre-login and continuous real-time end-point scanning ensures that end-point devices are safe to connect to the network. Secure Gateway replacement Citrix Presentation Server™ users can replace the secure gateway with Access Gateway, increasing security, extending access, and reducing costs. For more information see Secure Gateway Replacement. Industry standard security Information is kept private and protected using standards-based SSL/TLS encryption. Users are authenticated using standards such as LDAP, RADIUS, 2 factor authentication tokens and certificates. Drag and drop administration Simplified configuration with a powerful drag-and-drop interface used to define access controls and endpoint analysis. System monitoring tools provide an instant view of system activity. Policy based access Administrators define extensive Access Control Lists (ACLs) to control which network users and groups can access specific back-end resources. | |
Posted: 31-December-2008 05:52:58 AM By: Hash007 For explanation plz visit the following link http://www.iec.org/online/tutorials/acc_gate/ |