Implementing Virtual Private NetworksAnnotation The first complete guide to the installation, operation, and management of Virtual Private Networks (VPN), a fast-growing technology framework that lets organizations use the Internet as their own private network. Shows how all the pieces of VPN architecture fit together: encryption, authentication, special network security considerations, and more. Takes readers step by step through VPN implementation, troubleshooting, maintenance, and ongoing security. |
From inside the book
Results 1-3 of 11
Page 335
Steven Brown. Hash Functions Hash functions take a variable - length message and output a fixed- length string , usually 128 bits or more ; this is referred to as the hash value . Hash functions are one - way . A one - way hash function ...
Steven Brown. Hash Functions Hash functions take a variable - length message and output a fixed- length string , usually 128 bits or more ; this is referred to as the hash value . Hash functions are one - way . A one - way hash function ...
Page 447
... hashing functions . During the first hashing function , all passwords entered are converted to uppercase , which reduces the data space . Second , the hashing functions produce the same hash output , given the same password . In Chapter ...
... hashing functions . During the first hashing function , all passwords entered are converted to uppercase , which reduces the data space . Second , the hashing functions produce the same hash output , given the same password . In Chapter ...
Page 568
... hash function using MD5 that operates on 64 - byte blocks , outputs a 128 - bit authentication value ( hash value ) , and uses a shared secret key . HMAC - SHA - 1 A cryptographic hash function using SHA - 1 that oper- ates on 64 - byte ...
... hash function using MD5 that operates on 64 - byte blocks , outputs a 128 - bit authentication value ( hash value ) , and uses a shared secret key . HMAC - SHA - 1 A cryptographic hash function using SHA - 1 that oper- ates on 64 - byte ...
Contents
THE FOUNDATIONS OF VPNs | 6 |
Network Security for VPNs | 27 |
The Advantages and Disadvantages of VPN Technology | 55 |
Copyright | |
22 other sections not shown
Common terms and phrases
allow applications Aventail Buffer overflow certificate authority chapter cipher client communication configuration connection cryptographic cryptosystem data packet database decide decrypt dial-up digital signature encapsulation encryption algorithms export extranet Figure firewall firewall/VPN device gain root hardware hash function host implement infrastructure install interface internal network internal router Internet intrusion detection systems IP address IPSec ISAKMP issues L2TP laptop layer look machine monitoring network address network address translation network security operating system organization password plaintext port PPTP private key problems protocol public key RADIUS server Ravlin remote access remote users router routing S/KEY SAN DIEGO secret key SECURITY NOTE security policy setup someone standard subnet Switch tion topology traffic troubleshooting UNIX user authentication vendors Virtual Private Networks VPN device VPN domain VPN technology vulnerabilities