Implementing Virtual Private NetworksAnnotation The first complete guide to the installation, operation, and management of Virtual Private Networks (VPN), a fast-growing technology framework that lets organizations use the Internet as their own private network. Shows how all the pieces of VPN architecture fit together: encryption, authentication, special network security considerations, and more. Takes readers step by step through VPN implementation, troubleshooting, maintenance, and ongoing security. |
From inside the book
Results 1-3 of 56
Page 229
... define the network resources and services that are accessible to users and groups based on where they are coming ... Defines whether the rule will permit or deny access based on the criteria selected . Source Networks - Defines the ...
... define the network resources and services that are accessible to users and groups based on where they are coming ... Defines whether the rule will permit or deny access based on the criteria selected . Source Networks - Defines the ...
Page 401
... defined algorithm standards such as RSA and Diffie - Hellman . PKCS also defines independent standards that can be used for digital signatures , digital envelopes , and extended digital certificates . The current list of PKCS standards ...
... defined algorithm standards such as RSA and Diffie - Hellman . PKCS also defines independent standards that can be used for digital signatures , digital envelopes , and extended digital certificates . The current list of PKCS standards ...
Page 402
... defined for groups of people , thereby having one access point for multiple data types . Some of the LDAP standards define : The network protocol for accessing this information A namespace , defining how information is referenced How ...
... defined for groups of people , thereby having one access point for multiple data types . Some of the LDAP standards define : The network protocol for accessing this information A namespace , defining how information is referenced How ...
Contents
THE FOUNDATIONS OF VPNs | 6 |
Network Security for VPNs | 27 |
The Advantages and Disadvantages of VPN Technology | 55 |
Copyright | |
22 other sections not shown
Common terms and phrases
allow applications Aventail Buffer overflow certificate authority chapter cipher client communication configuration connection cryptographic cryptosystem data packet database decide decrypt dial-up digital signature encapsulation encryption algorithms export extranet Figure firewall firewall/VPN device gain root hardware hash function host implement infrastructure install interface internal network internal router Internet intrusion detection systems IP address IPSec ISAKMP issues L2TP laptop layer look machine monitoring network address network address translation network security operating system organization password plaintext port PPTP private key problems protocol public key RADIUS server Ravlin remote access remote users router routing S/KEY SAN DIEGO secret key SECURITY NOTE security policy setup someone standard subnet Switch tion topology traffic troubleshooting UNIX user authentication vendors Virtual Private Networks VPN device VPN domain VPN technology vulnerabilities