買這商品的人也買了...
-
$1,029Fundamentals of Data Structures in C++
-
$1,200$1,176 -
$199$199 -
$980$833 -
$650$553 -
$970Introduction to Algorithms, 2/e
-
$480$408 -
$630$536 -
$680$578 -
$600$510 -
$450$356 -
$680$578 -
$150$128 -
$990$782 -
$560$504 -
$780$663 -
$490$417 -
$720$612 -
$650$553 -
$480$379 -
$750$638 -
$780$616 -
$1,710$1,625 -
$990$782 -
$650$507
相關主題
商品描述
Using the public communications infrastructure to connect remoteusers to an organization's network is a cost-effective and efficient way to provide communication and collaboration opportunities across large distances. But how is private information kept private in a public network? And how may access be restricted to authorized individuals? Virtual Private networks (VPNs) hold the answer.
In Virtual Private Networking, Gil Held gives a detailed overview of the various VPN solutions available, how they are constructed, the rationale for their use, and which solutions satisfy which operational requirements. Detailed information on specific products available from vendors such as Cisco and Checkpoint together with hands-on examples on how to configure client and server in a Microsoft Windows operating environment, make this a supremely practical tutorial for practicing network managers and administrators
Read on for:
- Information on appropria te authenication and encryption techniques
- A tutorial on TCP/IP focused specifically at creating and operating VPNs
- In-depth discussion on tunneling protocols PPTP and L2TP
- A comparison of commonly used security protocols IPSec and SSL
- The rationale for service provider-based VPNs and advice on service level agreement parameters to consider when using a VPN service provider
Concluding this book is a comprehensive checklist of VPN features and operational techniques that may be used for 'build it yourself' applications as well as comparing the features and capabilities of third parties that provide VPN solutions.
Table of Contents:
Preface.
Acknowledgements.
Chapter 1 Introduction to Virtual Private Networking.
1.1 THE VPN CONCEPT.
1.2 BOOK PREVIEW.
Chapter 2 Understanding Authentication and Encryption.
2.1 AUTHENTICATION.
2.2 ENCRYPTION.
Chapter 3 Understanding the TCP/IP Protocol Suite.
3.1 FRAME FORMATION.
3.2 THE NETWORK LAYER.
3.3 THE TRANSPORT LAYER.
3.4 PROXY SERVICES AND NETWORK ADDRESS TRANSLATION.
Chapter 4 Layer 2 Operations.
4.1 THE POINT-TO-POINT PROTOCOL.
4.2 POINT-TO-POINT TUNNELING PROTOCOL.
4.3 LAYER 2 FORWARDING.
4.4 LAYER 2 TUNNELING PROTOCOL.
Chapter 5 Higher Layer VPNs.
5.1 UNDERSTANDING IPSEC.
5.2 WORKING WITH IPSEC.
5.3 SSL AND TLS.
Chapter 6 VPN Hardware and Software.
6.1 USING THE ASANTE VPN SECURITY ROUTER.
6.2 WINDOWS VPN SOFTWARE.
6.3 WORKING WITHWINDOWS 2000 SERVER.
Chapter 7 Service Provider-Based VPNs.
7.1 RATIONALE FOR USE.
7.2 TRANSPORT FACILITIES AND VPN OPERATION.
7.3 SERVICE LEVEL AGREEMENTS.
7.4 VPN SERVICE PROVIDER OVERVIEW.
Appendix A VPN Checklist.
Index.
商品描述(中文翻譯)
一本關於提供安全遠程訪問私人企業網絡的指南。
使用公共通信基礎設施將遠程用戶連接到組織的網絡是一種成本效益高且高效的方式,可以在長距離上提供通信和協作機會。但是,在公共網絡中如何保持私人信息的私密性?如何限制只有授權的個人可以訪問?虛擬私人網絡(VPN)提供了答案。
在《虛擬私人網絡》一書中,Gil Held詳細介紹了各種可用的VPN解決方案,它們的構建方式,使用它們的原因以及哪些解決方案滿足哪些操作要求。該書還提供了有關供應商(如Cisco和Checkpoint)提供的具體產品的詳細信息,以及在Microsoft Windows操作環境中配置客戶端和服務器的實際示例,使其成為實踐網絡管理人員和管理員的極其實用的教程。
閱讀以下內容:
- 適當的身份驗證和加密技術的信息
- 專注於創建和操作VPN的TCP/IP教程
- 關於隧道協議PPTP和L2TP的深入討論
- 常用安全協議IPSec和SSL的比較
- 使用VPN服務提供商時應考慮的服務水平協議參數的原因和建議
本書的結尾是一份全面的VPN功能和操作技術檢查表,可用於“自建”應用程序,以及比較提供VPN解決方案的第三方的功能和能力。
目錄:
- 前言
- 致謝
- 第1章 虛擬私人網絡簡介
- 第2章 身份驗證和加密的理解
- 第3章 TCP/IP協議套件的理解
- 第4章 第2層操作
- 第5章 更高層次的VPN
- 第6章 VPN硬件和軟件
- 第7章 基於服務提供商的VPN
- 附錄A VPN檢查表
- 索引