VPNs: A Beginner's Guide

John Mairs, Michael Mueller, Jackie Sieben

  • 出版商: McGraw-Hill/OsborneMedia
  • 出版日期: 2001-12-14
  • 售價: $1,699
  • 貴賓價: 9.5$1,614
  • 語言: 英文
  • 頁數: 592
  • 裝訂: Paperback
  • ISBN: 0072191813
  • ISBN-13: 9780072191813




Design and implement a virtual private network from start to finish

Take advantage of the most cost-effective and secure method for connecting branch offices and enabling remote access using VPNs: A Beginners Guide. This instructive guide shows you how design and implement a virtual private network from start to finish. Learn everything you need to know about VPNs beginning with networking fundamentals and layering principles to VPN protocols and security methods. Get details on the latest in tunneling technologies, including point-to-point tunneling protocol (PPTP) and layer two tunneling protocol (L2TP), and find out how to prevent hacker attacks. Learn about the latest and most advanced VPNs, such as IP Overlay VPNs and MPLS. Eight pages of blueprints depicting various types of VPNs help illustrate the concepts youve just read about. If you want a solid introduction to the inner workings of virtual private networks, this is the ideal book for you.

Get an overview of networking basics--including the OSI model, LANs, WANS, and TCP

Learn all about security components--policies, concepts, and architectures

Discover ways to filter out malicious information, and prevent threats and intrusions

Understand how VPNs relate to both public and private networks

Know the different types of tunneling methods and where they are usually implemented

Get details on the various VPN protocols--GRE, PPTP, L2F, and L2TP, and IPSec

Identify the components that define QoS--delay, bandwidth, jitter, and reliability

Preview the future of VPNs and understand MPLS, IP over ATM, tag switching, and more


   Part I: Networks and Security
    Chapter 1: Layering Architecture and the OSI Model
    Chapter 2: Network Architectures
    Chapter 3: The TCP/IP Protocol Stack
    Chapter 4: Security
    Chapter 5: Threats and Attack Methods
    Chapter 6: Intrusion Detection Systems
    Chapter 7: Firewalls

   Part II: Virtual Private Networks
    Chapter 8: VPN Basics
    Chapter 9: VPN Architectures

   Part III: VPN Protocols
    Chapter 10: Tunneling Protocols
    Chapter 11: L2F and L2TP

   Part IV: Secure Communication
    Chapter 12: Cryptography
    Chapter 13: Cryptographic Algorithms
    Chapter 14: Certificates
    Chapter 15: Authentication

   Part V: IPSec
    Chapter 16: IPSec Components
    Chapter 17: Key Management
    Chapter 18: Key Management/Exchange Protocols
    Chapter 19: IPSec Architecture and Implementation

   Part VI: MPLS
    Chapter 20: Quality of Service (QoS)
    Chapter 21: Traffic Engineering¿Movement of Data
    Chapter 22: MPLS Background
    Chapter 23: MPLS Components and Conceptsts