Implementing Virtual Private NetworksAnnotation The first complete guide to the installation, operation, and management of Virtual Private Networks (VPN), a fast-growing technology framework that lets organizations use the Internet as their own private network. Shows how all the pieces of VPN architecture fit together: encryption, authentication, special network security considerations, and more. Takes readers step by step through VPN implementation, troubleshooting, maintenance, and ongoing security. |
Contents
THE FOUNDATIONS OF VPNs | 6 |
Network Security for VPNs | 27 |
The Advantages and Disadvantages of VPN Technology | 55 |
Copyright | |
22 other sections not shown
Common terms and phrases
allow applications Aventail Buffer overflow certificate authority chapter cipher client communication configuration connection cryptographic cryptosystem data packet database decide decrypt dial-up digital signature encapsulation encryption algorithms export extranet Figure firewall firewall/VPN device gain root hardware hash function host implement infrastructure install interface internal network internal router Internet intrusion detection systems IP address IPSec ISAKMP issues L2TP laptop layer look machine monitoring network address network address translation network security operating system organization password plaintext port PPTP private key problems protocol public key RADIUS server Ravlin remote access remote users router routing S/KEY SAN DIEGO secret key SECURITY NOTE security policy setup someone standard subnet Switch tion topology traffic troubleshooting UNIX user authentication vendors Virtual Private Networks VPN device VPN domain VPN technology vulnerabilities