Juniper MAG Alternate Solutions? (Access Portal, SSL VPN)

Posted on 2014-08-28
Last Modified: 2014-09-17
Hi there,

I'm looking for a solution to replace Juniper MAg's secure access portal functionality, for clients that don't have Citrix XenApp/Desktop. Here's my requirements:

-Consolidate remote access
-For ease of remote users remembering a single URL (single access portal with SSO)
-For security to not expose insecure services (you can put all external apps besides SMTP behind the access portal, requiring users to login first to access them)
-Seamlessly integrate with backend app web portals and the protocols associated with them.
-HTML5 support for integrating with web applications
-IPSec or SSL VPN tunnels. MAGs are great for this, and even offer a lightweight  “SAM” VPN client that can tunnel individual applications.
-Integration with plain old RDS/RDP if Citrix not in client environment
-RDP tunneling with NLA (Network level Auth)
-File Access to Windows Shares, both for Windows and Mobile clients
-Integration with Citrix Storefront/XenApp

Mag problems:
-Ease of use: MAG’s Citrix XenApp ActiveX plugin requires a browser AND Java plugin AND Citrix Receiver, and often one of those components fails.
-MAG’s don’t support RDP 6.1’s NLA (network Level Authentication), forcing clients to disable it on servers and introduce possible Man-in-the-middle RDP attacks.

Some Solutions I've looked at:
-Citrix NetScaler- really limited functionality if the client doesnt have Citrix
-Plain old SSL VPN via the firewall- no single access portal for end users
-Windows RemoteApp- most clients not fans
-Okta- Most clients nto fans of cloud based services

Thanks for your recommendations!
Question by:Graycon
    1 Comment
    LVL 18

    Accepted Solution

    Sonicwall sra series of VPN appliances. I have the SRA-1600 and all my users love it. It can do everything you have in your checklist.

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    Join & Write a Comment

    Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
    Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    729 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    23 Experts available now in Live!

    Get 1:1 Help Now