Why Use Secure Access Parent topic

Virtual Mobile Infrastructure Secure Access enables mobile device clients to securely access the Virtual Mobile Infrastructure server via the Internet. If you do not want to expose the Virtual Mobile Infrastructure Server on the Internet, not even in the DMZ, you will need to install Secure Access. If required, you can install multiple Secure Access through an L4 switch for load balancing.
The following are the advantages of using Secure Access:
  • If using Secure Access, you only need to open one IP Address and one port number for mobile clients. The Secure Access receives a mobile device client enrollment request through HTTPS, and relays it to the Virtual Mobile Infrastructure server.
  • Secure Access and Virtual Mobile Infrastructure server use a firewall for outbound network connections to ensure security.
Secure Access can be deployed in a DMZ or an Intranet, using single or two network cards:
  • You need only one network card, if you configure the Internet mobile devices and Secure Access in different networks.
  • You need two network cards, if you configure the Internet mobile devices and Secure Access in the same network, in bridge mode. That is, one network card provides connection between the mobile device clients and Secure Access, while the other network card connects Secure Access with the Virtual Mobile Infrastructure server.