Implementing Virtual Private Networks
Annotation The first complete guide to the installation, operation, and management of Virtual Private Networks (VPN), a fast-growing technology framework that lets organizations use the Internet as their own private network. Shows how all the pieces of VPN architecture fit together: encryption, authentication, special network security considerations, and more. Takes readers step by step through VPN implementation, troubleshooting, maintenance, and ongoing security.
Try this search over all volumes: ям eld
Results 1-0 of 0
What people are saying - Write a review
We haven't found any reviews in the usual places.
THE FOUNDATIONS OF VPNs
Network Security for VPNs
The Advantages and Disadvantages of VPN Technology
29 other sections not shown
address space allow applications attacks Aventail beneﬁts block cipher certiﬁcate authority chapter cipher client communication company’s conﬁguration connection cryptographic database decide decrypt deﬁned destination digital signature encapsulation encryption algorithm encryption strengths export extranet ﬁeld Figure ﬁle ﬁnancial ﬁnd ﬁre ﬁrewall ﬁrewall/VPN device ﬁrst ﬂexibility ﬂow hardware hash function host infrastructure install interface internal network internal router Internet intrusion detection systems IP address IPSec ISAKMP L2TP look machine monitor network address translation operating system organization password port PPTP Private Networks problems protocol public key RADIUS server Ravlin remote access Remote Laptop remote users router routing SECURITY NOTE setup SMTP speciﬁc standard subnet Switch tion topology trafﬁc troubleshooting UNIX user authentication vendors Virtual Private Networks VPN device VPN domain VPN technology VPN tunnel vulnerabilities