Virtual Private Networking : A Construction, Operation and Utilization Guide

Gilbert Held

  • 出版商: Wiley
  • 出版日期: 2004-04-02
  • 定價: $3,500
  • 售價: 5.0$1,750
  • 語言: 英文
  • 頁數: 306
  • 裝訂: Paperback
  • ISBN: 0470854324
  • ISBN-13: 9780470854327

立即出貨 (庫存 < 3)

買這商品的人也買了...

相關主題

商品描述

A guide to delivering secure remote access to private enterprise networks.

Using the public communications infrastructure to connect remoteusers to an organization's network is a cost-effective and efficient way to provide communication and collaboration opportunities across large distances.  But how is private information kept private in a public network? And how may access be restricted to authorized individuals? Virtual Private networks (VPNs) hold the answer.

In Virtual Private Networking, Gil Held gives a detailed overview of the various VPN solutions available, how they are constructed, the rationale for their use, and which solutions satisfy which operational requirements.  Detailed information on specific products available from vendors such as Cisco and Checkpoint together with hands-on examples on how to configure client and server in a Microsoft Windows operating environment, make this a supremely practical tutorial for practicing network managers and administrators

Read on for:

  • Information on appropria te authenication and encryption techniques
  • A tutorial on TCP/IP focused specifically at creating and operating VPNs
  • In-depth discussion on tunneling protocols PPTP and L2TP
  • A comparison of commonly used security protocols IPSec and SSL
  • The rationale for service provider-based VPNs and advice on service level agreement parameters to consider when using a VPN service provider

Concluding this book  is a comprehensive checklist of VPN features and operational techniques that may be used for 'build it yourself' applications as well as comparing the features and capabilities of third parties that provide VPN solutions.

Table of Contents:

Preface.

Acknowledgements.

Chapter 1 Introduction to Virtual Private Networking.

1.1 THE VPN CONCEPT.

1.2 BOOK PREVIEW.

Chapter 2 Understanding Authentication and Encryption.

2.1 AUTHENTICATION.

2.2 ENCRYPTION.

Chapter 3 Understanding the TCP/IP Protocol Suite.

3.1 FRAME FORMATION.

3.2 THE NETWORK LAYER.

3.3 THE TRANSPORT LAYER.

3.4 PROXY SERVICES AND NETWORK ADDRESS TRANSLATION.

Chapter 4 Layer 2 Operations.

4.1 THE POINT-TO-POINT PROTOCOL.

4.2 POINT-TO-POINT TUNNELING PROTOCOL.

4.3 LAYER 2 FORWARDING.

4.4 LAYER 2 TUNNELING PROTOCOL.

Chapter 5 Higher Layer VPNs.

5.1 UNDERSTANDING IPSEC.

5.2 WORKING WITH IPSEC.

5.3 SSL AND TLS.

Chapter 6 VPN Hardware and Software.

6.1 USING THE ASANTE VPN SECURITY ROUTER.

6.2 WINDOWS VPN SOFTWARE.

6.3 WORKING WITHWINDOWS 2000 SERVER.

Chapter 7 Service Provider-Based VPNs.

7.1 RATIONALE FOR USE.

7.2 TRANSPORT FACILITIES AND VPN OPERATION.

7.3 SERVICE LEVEL AGREEMENTS.

7.4 VPN SERVICE PROVIDER OVERVIEW.

Appendix A VPN Checklist.

Index.