Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

VPN


1. 

SSL VPN

SSL VPN

By: Joseph Steinberg; Tim Speed

Publisher: Packt Publishing

Publication Date: 09-MAR-2005

Insert Date: 17-JAN-2012

Slots: 1.0

Table of Contents • Start Reading

"A comprehensive overview of SSL VPN technologies and design strategiesUnderstand how SSL VPN technology worksEvaluate how SSL VPN could fit into your organisation?s security strategyPractical advice on educating users, integrating legacy systems, and eliminating security loopholesWritten by experienced SSL VPN and data security professionalsIn DetailVirtual Private Networks (VPNs) provide remote workers with secure access to their company network via the internet by encrypting all data sent between the company network and the user?s machine (the client). Before SSL VPN this typically...

2. 

VPN mit Linux: Grundlagen und Anwendung virtueller privater Netzwerke mit Open Source-Tools

VPN mit Linux: Grundlagen und Anwendung virtueller privater Netzwerke mit Open Source-Tools

By: Ralf Spenneberg

Publisher: Addison-Wesley Verlag

Publication Date: 29-APR-2010

Insert Date: 15-JAN-2012

Slots: 1.0

Table of Contents • Start Reading

Mit dieser lang erwarteten, vollständig aktualisierten 2. Auflage seines Bestsellers legt Security-Experte Ralf Spenneberg erneut das Standardwerk für Einrichtung und Betrieb virtueller privater Netzwerke mit Linux vor. Äußerst praxisorientiert und detailliert führt er Sie durch die Umsetzung von VPN-Lösungen mit Openswan, strongSwan, Racoon, Isakmpd sowie OpenVPN 2.x – von einfachen Szenarien bis zu komplexen Konfigurationen....

3. 

OpenVPN 2 Cookbook

OpenVPN 2 Cookbook

By: Jan Just Keijser;

Publisher: Packt Publishing

Publication Date: 17-FEB-2011

Insert Date: 12-AUG-2011

Slots: 1.0

Table of Contents • Start Reading

100 simple and incredibly effective recipes for harnessing the power of the OpenVPN 2 network Set of recipes covering the whole range of tasks for working with OpenVPN The quickest way to solve your OpenVPN problems! Set up, configure, troubleshoot and tune OpenVPN Uncover advanced features of OpenVPN and even some undocumented options In Detail OpenVPN http://www.openvpn.net is a free and open source virtual private network (VPN) program for creating point-to-point or server-to-multiclient encrypted tunnels between host computers. It is capable of establishing direct links...

4. 

A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications Evaluate market drivers for Layer 2 VPNs Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3 Grasp the essentials of Layer 2 LAN and WAN technologies Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local...

5. 

Beginning OpenVPN 2.0.9

Beginning OpenVPN 2.0.9

By: Markus Feilner; Norbert Graf

Publisher: Packt Publishing

Publication Date: 02-DEC-2009

Insert Date: 08-JUN-2010

Slots: 1.0

Table of Contents • Start Reading

Build and integrate Virtual Private Networks using OpenVPN A practical guide to using OpenVPN for building both basic and complex Virtual Private Networks (VPNs) Learn how to make use of OpenVPNs modules, high-end-encryption and how to combine it with servers for your individual privacy Advanced management of security certificates Get to know the new features of the forthcoming version 2.1 of OpenVPN All examples in the book work with version 2.0.9 and 2.1 In Detail OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections,...

6. 

OpenVPN: kurz & gut

OpenVPN: kurz & gut

By: Sven Riedel

Publisher: O'Reilly Verlag

Publication Date: 15-JUL-2007

Insert Date: 14-APR-2009

Slots: 1.0

Table of Contents • Start Reading

Virtuelle Private Netzwerke bauen einen Tunnel zwischen zwei Rechnern auf, durch den jeglicher Datenverkehr verschlüsselt fließt. Sie sind aus dem modernen Arbeitsleben nicht mehr wegzudenken und bieten beispielsweise externen Mitarbeitern die Möglichkeit, von außen über einen sicheren VPN-Zugang auf das Firmennetzwerk zuzugreifen. OpenVPN ist ein freies Client/Server-VPN-Programm, das die Daten mit SSL verschlüsselt und das für alle gängigen Plattformen verfügbar ist.M Sven Riedel erklärt, wie man OpenVPN auf den verschiedenen Betriebssystemen installiert, und stellt die grundlegenden...

7. 

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

Juniper(r) Networks Secure Access SSL VPN Configuration Guide

By: Cameron

Publisher: Syngress

Publication Date: 18-JUL-2007

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform. * Complete coverage of the Juniper Networks Secure Access SSL...

8. 

VPN – Virtuelle Private Netzwerke: Aufbau und Sicherheit

VPN – Virtuelle Private Netzwerke: Aufbau und Sicherheit

By: Manfred Lipp

Publisher: Addison-Wesley Verlag

Publication Date: 27-SEP-2007

Insert Date: 18-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Mit einem VPN lassen sich Daten sicher über öffentliche Netzwerke transportieren. Nach einer kurzen Einführung in die Grundlagen widmet sich Autor Manfred Lipp ausführlich der VPN-Integration in Sicherheitsarchitekturen und SSL-VPNs. Ein weiterer Schwerpunkt liegt auf dem Einsatz von Microsoft VPN-Clients sowie VoIP (Voice over IP) und QoS (Quality of Service) im VPN. Im abschließenden Praxisteil beschreibt er anhand von mehreren Beispielszenarien, wie Sie ein VPN implementieren. Das Buch richtet sich an all diejenigen, die ein VPN betreiben oder planen, dies zu tun, und sich deshalb etwas...

9. 

SSL Remote Access VPNs (Network Security)

SSL Remote Access VPNs (Network Security)

By: Jazib CCIE No. 5459 Frahim; Qiang CCIE No. 4937 Huang

Publisher: Cisco Press

Publication Date: 10-JUN-2008

Insert Date: 18-JUN-2008

Slots: 1.0

Table of Contents • Start Reading

SSL Remote Access VPNs An introduction to designing and configuring SSL virtual private networks Jazib Frahim, CCIE® No. 5459 Qiang Huang, CCIE No. 4937 Cisco® SSL VPN solutions (formerly known as Cisco WebVPN solutions) give you a flexible and secure way to extend networking resources to virtually any remote user with access to the Internet and a web browser. Remote access based on SSL VPN delivers secure access to network resources by establishing an encrypted tunnel across the Internet using a broadband (cable or DSL) or ISP dialup connection. SSL Remote Access VPNs provides...

10. 

Building and Integrating Virtual Private Networks with Openswan

Building and Integrating Virtual Private Networks with Openswan

By: Paul Wouters; Ken Bantoft

Publisher: Packt Publishing

Publication Date: 13-FEB-2006

Insert Date: 28-DEC-2007

Slots: 1.0

Table of Contents • Start Reading

Building and Integrating Virtual Private Networks with Openswan is written by the Openswan development team. This book is a comprehensive guide to using Openswan for building both basic and industry size, military strength VPNs for medium to very large organizations. Written by the core developers, this practical book is all you need to use Openswan to build any VPN infrastructure you may need. The authors have covered the latest developments and upcoming issues. This book will not only help you build the VPN you need, but also save you a lot of time. ...

11. 

OpenVPN

OpenVPN

By: M Feilner

Publisher: Packt Publishing

Publication Date: 15-MAR-2006

Insert Date: 28-DEC-2007

Slots: 1.0

Table of Contents • Start Reading

This book is a comprehensive guide to using OpenVPN for building both secure VPNs. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic VPN concepts, then moves to introduce basic OpenVPN configurations, before covering advanced uses of OpenVPN. This book is for both experienced and new OpenVPN users. ...

12. 

[Read Me First] Building or Buying VPNs

ShortCut

[Read Me First] Building or Buying VPNs

By: 

Publisher: Cisco Press

Publication Date: 22-MAR-2007

Insert Date: 21-MAR-2007

Slots: 1.0

Table of Contents • Start Reading

[Read Me First]: Building or Buying VPNs (Digital Short Cut) Kunjal Trivedi ISBN-10: 1-58720-134-8 ISBN-13: 978-1-58720-134-9 One of the most popular approaches to establishing a secure computing and network environment is the virtual private network (VPN), which enables organizations to use Internet transport securely to connect remote offices and remote users to the main corporate site, thus eliminating expensive dedicated WAN links and modem banks. Furthermore, with the advent of cost-effective, high-bandwidth technologies such as DSL, organizations can use VPNs to reduce their...

13. 

Selecting MPLS VPN Services

Selecting MPLS VPN Services

By: 

Publisher: Cisco Press

Publication Date: 13-FEB-2006

Insert Date: 30-OCT-2006

Slots: 1.0

Table of Contents • Start Reading

A guide to using and defining MPLS VPN services Analyze strengths and weaknesses of TDM and Layer 2 WAN services Understand the primary business and technical issues when evaluating IP/MPLS VPN offerings Describe the IP addressing, routing, load balancing, convergence, and services capabilities of the IP VPN Develop enterprise quality of service (QoS) policies and implementation guidelines Achieve scalable support for multicast services Learn the benefits and drawbacks of various security and encryption mechanisms Ensure proper use of services and plan for future...

14. 

IPsec Virtual Private Network Fundamentals

IPsec Virtual Private Network Fundamentals

By: 

Publisher: Cisco Press

Publication Date: 19-JUL-2006

Insert Date: 11-AUG-2006

Slots: 1.0

Table of Contents • Start Reading

An introduction to designing and configuring Cisco IPsec VPNs Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutions IPsec Virtual Private Network Fundamentals provides a basic working knowledge of IPsec on various Cisco routing and switching platforms. It provides...

15. 

Comparing, Designing, and Deploying VPNs

Comparing, Designing, and Deploying VPNs

By: 

Publisher: Cisco Press

Publication Date: 12-APR-2006

Insert Date: 10-AUG-2006

Slots: 1.0

Table of Contents • Start Reading

A practical guide for comparing, designing, and deploying IPsec, MPLS Layer 3, L2TPv3, L2TPv2, AToM, and SSL virtual private networks Explore the major VPN technologies and their applications, design, and configurations on the Cisco IOS® Router, Cisco® ASA 5500 Series, and the Cisco VPN 3000 Series Concentrator platforms Compare the various VPN protocols and technologies, learn their advantages and disadvantages, and understand their real-world applications and methods of integration Find out how to design and implement Secure Socket Layer (SSL) VPNs, including consideration of...

16. 

The Complete Cisco VPN Configuration Guide

The Complete Cisco VPN Configuration Guide

By: Richard Deal

Publisher: Cisco Press

Publication Date: 15-DEC-2005

Insert Date: 21-DEC-2005

Slots: 1.0

Table of Contents • Start Reading

Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution A complete resource for understanding VPN components and VPN design issues Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients Discover troubleshooting tips and techniques from real-world scenarios based on the author’s vast field experience Filled with relevant...

17. 

VPNs Illustrated: Tunnels, VPNs, and IPsec

VPNs Illustrated: Tunnels, VPNs, and IPsec

By: 

Publisher: Addison-Wesley Professional

Publication Date: 26-OCT-2005

Insert Date: 16-NOV-2005

Slots: 1.0

Table of Contents • Start Reading

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs...

18. 

MPLS VPN Security

MPLS VPN Security

By: 

Publisher: Cisco Press

Publication Date: 08-JUN-2005

Insert Date: 01-JUL-2005

Slots: 1.0

Table of Contents • Start Reading

A practical guide to hardening MPLS networks  Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s backbone, misconfigurations, sniffing, and inside attack forms Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons Interpret complex architectures such as extranet...

19. 

Troubleshooting Virtual Private Networks

Troubleshooting Virtual Private Networks

By: 

Publisher: Cisco Press

Publication Date: 27-MAY-2004

Insert Date: 23-APR-2005

Slots: 1.0

Table of Contents • Start Reading

Master advanced troubleshooting techniques for IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Learn the step-by-step, end-to-end methodology essential for troubleshooting virtual private networks (VPNs) Gain the in-depth knowledge necessary for fast and efficient troubleshooting of IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Master advanced troubleshooting tools and techniques for all applicable VPN types Debug and fix IPSec site-to-site and remote access VPN issues, such as IKE (ISAKMP) phase 1 and phase 2...

20. 

Building MPLS-Based Broadband Access VPNs

Building MPLS-Based Broadband Access VPNs

By: 

Publisher: Cisco Press

Publication Date: 15-NOV-2004

Insert Date: 30-MAR-2005

Slots: 1.0

Table of Contents • Start Reading

Implement the design principles and configurations behind MPLS-based VPNs for broadband access networks The book discusses how MPLS and its VPN service are best used in a broadband environment, concentrating on key design issues and solutions, including How to manage tens of thousands of interfaces and host routes and hundreds of dynamic VPNs When a Virtual Home Gateway is necessary Why use dynamic address assignment How routes should be summarized into the core Deploy MPLS VPNs successfully in broadband networks with Building MPLS-Based Broadband Access VPNs. This book...