Methods, signals, devices, and systems are provided for secure access to
a network from an external client. Requests for access to confidential data may
be redirected from a target server to a border server, after which a secure sockets
layer connection between the border server and the external client carries user
authentication information. After the user is authenticated to the network, requests
may be redirected back to the original target server. Web pages sent from the target
server to the external client are scanned for non-secure URLs such as those containing
"http://" and modified to make them secure. The target server and the border server
utilize various combinations of secure and non-secure caches. Although tunneling,
may be used, the extensive configuration management burdens imposed by virtual
private networks are not required.