Implementing Virtual Private NetworksAnnotation The first complete guide to the installation, operation, and management of Virtual Private Networks (VPN), a fast-growing technology framework that lets organizations use the Internet as their own private network. Shows how all the pieces of VPN architecture fit together: encryption, authentication, special network security considerations, and more. Takes readers step by step through VPN implementation, troubleshooting, maintenance, and ongoing security. |
From inside the book
Results 1-3 of 29
Page 309
... Encapsulation Encryption and encapsulation are often talked about in the VPN mar- ketplace . As mentioned , encryption is the process of encrypting a data packet for transport over the Internet or some other network . Encapsu- lation is ...
... Encapsulation Encryption and encapsulation are often talked about in the VPN mar- ketplace . As mentioned , encryption is the process of encrypting a data packet for transport over the Internet or some other network . Encapsu- lation is ...
Page 375
... Encapsulation ) mechanism to provide a flow- and congestion - controlled encapsulated datagram service for carrying PPP packets . PPTP can take packets such as IP , IPX , NetBios , and SNA and wrap them in a new IP packet for transport ...
... Encapsulation ) mechanism to provide a flow- and congestion - controlled encapsulated datagram service for carrying PPP packets . PPTP can take packets such as IP , IPX , NetBios , and SNA and wrap them in a new IP packet for transport ...
Page 554
... Encapsulation over IPv4 networks Security Architecture for the Internet Protocol . IP Authentication Header . The ... Encapsulating Security Payload ( ESP ) . The Internet IP Security Domain of Interpretation for ISAKMP . RFC 2408 RFC ...
... Encapsulation over IPv4 networks Security Architecture for the Internet Protocol . IP Authentication Header . The ... Encapsulating Security Payload ( ESP ) . The Internet IP Security Domain of Interpretation for ISAKMP . RFC 2408 RFC ...
Contents
THE FOUNDATIONS OF VPNs | 6 |
Network Security for VPNs | 27 |
The Advantages and Disadvantages of VPN Technology | 55 |
Copyright | |
22 other sections not shown
Common terms and phrases
allow applications Aventail Buffer overflow certificate authority chapter cipher client communication configuration connection cryptographic cryptosystem data packet database decide decrypt dial-up digital signature encapsulation encryption algorithms export extranet Figure firewall firewall/VPN device gain root hardware hash function host implement infrastructure install interface internal network internal router Internet intrusion detection systems IP address IPSec ISAKMP issues L2TP laptop layer look machine monitoring network address network address translation network security operating system organization password plaintext port PPTP private key problems protocol public key RADIUS server Ravlin remote access remote users router routing S/KEY SAN DIEGO secret key SECURITY NOTE security policy setup someone standard subnet Switch tion topology traffic troubleshooting UNIX user authentication vendors Virtual Private Networks VPN device VPN domain VPN technology vulnerabilities