Virtual Private Networking: A View from the Trenches
VPNs are rapidly becoming the networking technology of choice for companies that want to link their locations, customers, and/or suppliers cost-effectively. This hands-on, "in-the-trenches" guidebook cuts through the VPN hype, helping any network professional build, secure, and manage a VPN successfully. The book covers both business and technical aspects of VPN consideration, planning, design, implementation, and ongoing management. Discover what VPNs are and how they work; make the business case for building a VPN; and determine whether to build it yourself or outsource it to an Internet service provider. Compare VPN deployment models; understand the L2TP tunneling protocol; learn your options for providing consistent Quality of Service and service-level guarantees; and more. The book also contains six detailed case studies; a full chapter on service provider VPN offerings; and a preview of the future of VPNs.
What people are saying - Write a review
We haven't found any reviews in the usual places.
THE NETWORKING EVOLUTION TO VPNs
THE BUSINESS CASE FOR VPNs
5 other sections not shown
algorithm ATMP authentication backbone bandwidth broadband called capability carrier channel Chapter configuration connection corporate customer premise data network database deployed deployment destination dial VPN Differentiated Services DiffServ discussed encapsulation encryption End-to-End model End-to-End VPN endpoints enterprise equipment extranet firewall Frame Relay function header Hybrid Provider VPN implement infrastructure interface Internet access Internet Service Provider intranet IP address IPSec IPv6 issues L2TP Layer leased line ment multicast network management offer operations outsourcing packet password performance point-to-point ports PPTP Provider's public key Public Key Infrastructure Pure Provider VPN Quality of Service RADIUS server Remote Access Concentrator remote access VPN routers routing Service Provider network session SNMP standard subscriber switches telecommunications tion traffic tunneling protocol typically user's vendor Virtual Circuits Virtual Private Networking VPN client VPN customer VPN server VPN service VPN technology VPN tunneling xDSL