Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

Virtual Private Networks 2e

Paperback Engels 1999 9781565925298
Verwachte levertijd ongeveer 16 werkdagen

Samenvatting

Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organizationThe solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support.Topics include:

-How the VPN compares to other available networking technologies
-Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work
-Point to Point Tunneling Protocol (PPTP) and L2TP
-The Altavista Tunnel
-The Cisco PIX Firewall
-Secure Shell (SSH)
-Maintenance and troubleshooting

Specificaties

ISBN13:9781565925298
Taal:Engels
Bindwijze:paperback
Aantal pagina's:232
Uitgever:O'Reilly
Verschijningsdatum:20-1-1999
Hoofdrubriek:IT-management / ICT
ISSN:

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Preface; Audience; Contents of This Book; Conventions Used in This Book; Comments and Questions; Updates; Acknowledgments;Chapter 1: Why Build a Virtual Private Network?; 1.1 What Does a VPN Do?; 1.2 Security Risks of the Internet; 1.3 How VPNs Solve Internet Security Issues; 1.4 VPN Solutions; 1.5 A Note on IP Address and Domain Name Conventions Used in This Book;Chapter 2: Basic VPN Technologies; 2.1 Firewall Deployment; 2.2 Encryption and Authentication; 2.3 VPN Protocols; 2.4 Methodologies for Compromising VPNs; 2.5 Patents and Legal Ramifications;Chapter 3: Wide Area, Remote Access, and the VPN; 3.1 General WAN, RAS, and VPN Concepts; 3.2 VPN Versus WAN; 3.3 VPN Versus RAS;Chapter 4: Implementing Layer 2 Connections; 4.1 Differences Between PPTP, L2F, and L2TP; 4.2 How PPTP Works; 4.3 Features of PPTP;Chapter 5: Configuring and Testing Layer 2 Connections; 5.1 Installing and Configuring PPTP on a Windows NT RAS Server; 5.2 Configuring PPTP for Dial-up Networking on a Windows NT Client; 5.3 Configuring PPTP for Dial-up Networking on a Windows 95 or 98 Client; 5.4 Enabling PPTP on Remote Access Switches; 5.5 Making the Calls; 5.6 Troubleshooting Problems; 5.7 Using PPTP with Other Security Measures;Chapter 6: Implementing the AltaVista Tunnel 98; 6.1 Advantages of the AltaVista Tunnel System; 6.2 AltaVista Tunnel Limitations; 6.3 How the AltaVista Tunnel Works; 6.4 VPNs and AltaVista;Chapter 7: Configuring and Testing the AltaVista Tunnel; 7.1 Getting Busy; 7.2 Installing the AltaVista Tunnel; 7.3 Configuring the AltaVista Tunnel Extranet and Telecommuter Server; 7.4 Configuring the AltaVista Telecommuter Client; 7.5 Troubleshooting Problems;Chapter 8: Creating a VPN with the Unix Secure Shell; 8.1 The SSH Software; 8.2 Building and Installing SSH; 8.3 SSH Components; 8.4 Creating a VPN with PPP and SSH; 8.5 Troubleshooting Problems; 8.6 A Performance Evaluation;Chapter 9: The Cisco PIX Firewall; 9.1 The Cisco PIX Firewall; 9.2 The PIX in Action; 9.3 Configuring the PIX as a Gateway; 9.4 Configuring the Other VPN Capabilities;Chapter 10: Managing and Maintaining Your VPN; 10.1 Choosing an ISP; 10.2 Solving VPN Problems; 10.3 Delivering Quality of Service; 10.4 Security Suggestions; 10.5 Keeping Yourself Up-to-Date;Chapter 11: A VPN Scenario; 11.1 The Topology; 11.2 Central Office; 11.3 Large Branch Office; 11.4 Small Branch Offices; 11.5 Remote Access Users; 11.6 A Network Diagram;Emerging Internet Technologies; IPv6; IPSec; S/WAN;Resources, Online and Otherwise; Software Updates; The IETF; CERT Advisories; The Trade Press; Networking and Intranet-Related Web Sites; Usenet Newsgroups; Mailing Lists;Colophon;

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Virtual Private Networks 2e