eBooks-it.org Logo
eBooks-IT.org Inner Image

VPNs Illustrated

Tunnels, VPNs and IPsec

VPNs Illustrated Image

Book Details:

Publisher:Addison-Wesley Professional
Series: Addison Wesley , Illustrated
Author:Jon C. Snader
Edition:1
ISBN-10:032124544X
ISBN-13:9780321245441
Pages:480
Published:Nov 05 2005
Posted:Nov 19 2014
Language:English
Book format:CHM
Book size:5.4 MB

Book Description:

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." By learning to read and interpret various network traces, such as those produced by tcpdump, readers will be able to better understand and troubleshoot VPN and network behavior. Specific topics covered include: Block and stream symmetric ciphers, such as AES and RC4; and asymmetric ciphers, such as RSA and EIGamal Message authentication codes, including HMACs Tunneling technologies based on gtunnel SSL protocol for building network-to-network VPNs SSH protocols as drop-in replacements for telnet, ftp, and the BSD r-commands Lightweight VPNs, including VTun, CIPE, tinc, and OpenVPN IPsec, including its Authentication Header (AH) protocol, Encapsulating Security Payload (ESP), and IKE (the key management protocol) Packed with details, the text can be used as a handbook describing the functions of the protocols and the message formats that they use. Source code is available for download, and an appendix covers publicly available software that can be used to build tunnels and analyze traffic flow. VPNs Illustrated gives you the knowledge of tunneling and VPN technology you need to understand existing VPN implementations and successfully create your own.

Download Link:

Related Books:

Comparing, Designing and Deploying VPNs

Comparing, Designing and Deploying VPNs Image
A practical guide for comparing, designing, and deploying IPsec, MPLS Layer 3, L2TPv3, L2TPv2, AToM, and SSL virtual private networks Explore the major VPN technologies and their applications, design, and configurations on the Cisco IOS Router, Cisco ASA 5500 Series, and the Cisco VPN 3000 Series Concentrator platforms Compare the various VPN protocols and technologies, learn their advantages and disadvantages, and understand their real-world applications and methods of integration Find out how to design and implement Secure Socket Layer (SSL) VPNs, including consideration of clientless operation, the Cisco SSL VPN Client, the Cisco Secure Desktop, file and web server access, e-mail proxies, and port forwarding Learn how to deploy scalable and secur...

End-to-End QoS Network Design

Quality of Service in LANs, WANs, and VPNs
End-to-End QoS Network Design Image
Best-practice QoS designs for protecting voice, video, and critical data while mitigating network denial-of-service attacks Understand the service-level requirements of voice, video, and data applications Examine strategic QoS best practices, including Scavenger-class QoS tactics for DoS/worm mitigation Learn about QoS tools and the various interdependencies and caveats of these tools that can impact design considerations Learn how to protect voice, video, and data traffic using various QoS mechanisms Evaluate design recommendations for protecting voice, video, and multiple classes of data while mitigating DoS/worm attacks for the following network infrastructure architectures: campus LAN, private WAN, MPLS VPN, and IPSec VPN Quality of Service (Qo...

SSL Remote Access VPNs

SSL Remote Access VPNs Image
SSL Remote Access VPNs An introduction to designing and configuring SSL virtual private networks Jazib Frahim, CCIE No. 5459 Qiang Huang, CCIE No. 4937 Cisco SSL VPN solutions (formerly known as Cisco WebVPN solutions) give you a flexible and secure way to extend networking resources to virtually any remote user with access to the Internet and a web browser. Remote access based on SSL VPN delivers secure access to network resources by establishing an encrypted tunnel across the Internet using a broadband (cable or DSL) or ISP dialup connection. SSL Remote Access VPNs provides you with a basic working knowledge of SSL virtual private networks on Cisco SSL VPN-capable devices. Design guidance is provided to assist you in implementing SSL VPN in ...



2007 - 2021 © eBooks-IT.org