Implementing Virtual Private NetworksAnnotation The first complete guide to the installation, operation, and management of Virtual Private Networks (VPN), a fast-growing technology framework that lets organizations use the Internet as their own private network. Shows how all the pieces of VPN architecture fit together: encryption, authentication, special network security considerations, and more. Takes readers step by step through VPN implementation, troubleshooting, maintenance, and ongoing security. |
From inside the book
Results 1-3 of 29
Page 496
... intrusions . Intrusion detection systems are software placed throughout the orga- nization that will help you and your company determine if an intrusion has taken place . Some intrusion systems are designed to run in real time , meaning ...
... intrusions . Intrusion detection systems are software placed throughout the orga- nization that will help you and your company determine if an intrusion has taken place . Some intrusion systems are designed to run in real time , meaning ...
Page 503
... intrusions . Client / server . You want to choose system and network intruder detection systems that are heterogeneous and can work across sev- eral environments , e.g. , UNIX and NT . Reporting . It makes no sense to install an IDS and ...
... intrusions . Client / server . You want to choose system and network intruder detection systems that are heterogeneous and can work across sev- eral environments , e.g. , UNIX and NT . Reporting . It makes no sense to install an IDS and ...
Page 521
... Intrusion detection systems are meant to fill that role . By using an IDS set up in a anomaly mode , a rule - based inferential engine is used to monitor traffic and detect irregular patterns in various protocols and services occurring ...
... Intrusion detection systems are meant to fill that role . By using an IDS set up in a anomaly mode , a rule - based inferential engine is used to monitor traffic and detect irregular patterns in various protocols and services occurring ...
Contents
THE FOUNDATIONS OF VPNs | 6 |
Network Security for VPNs | 27 |
The Advantages and Disadvantages of VPN Technology | 55 |
Copyright | |
22 other sections not shown
Common terms and phrases
allow applications Aventail Buffer overflow certificate authority chapter cipher client communication configuration connection cryptographic cryptosystem data packet database decide decrypt dial-up digital signature encapsulation encryption algorithms export extranet Figure firewall firewall/VPN device gain root hardware hash function host implement infrastructure install interface internal network internal router Internet intrusion detection systems IP address IPSec ISAKMP issues L2TP laptop layer look machine monitoring network address network address translation network security operating system organization password plaintext port PPTP private key problems protocol public key RADIUS server Ravlin remote access remote users router routing S/KEY SAN DIEGO secret key SECURITY NOTE security policy setup someone standard subnet Switch tion topology traffic troubleshooting UNIX user authentication vendors Virtual Private Networks VPN device VPN domain VPN technology vulnerabilities