VPNs: A Beginner's Guide

VPNs: A Beginner's Guide

VPNs: A Beginner's Guide

VPNs: A Beginner's Guide

Paperback

$49.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

A comprehensive introduction to VPNs and networking basics, this book provides readers with a solid foundation of networking basics and the understanding necessary for learning the complexities of the VPN technology that follows. It takes the reader through the actual steps involved in provisioning the hardware, software and set-up with the provider of services for Internet access and communications carriers, thus leading to a comprehensive understanding of all VPN protocols. There is also detailed information about securing VPNs, including information on intrusion detection. Readers gain an understanding of security, encryption, encapsulation, key management and intrusion detection systems, all necessary for a secure network. Networking blueprints for 4 different types of VPNs, including IPSec and PPPT are also included.

Product Details

ISBN-13: 9780072191813
Publisher: McGraw-Hill/Osborne Media
Publication date: 12/14/2001
Series: Network Professional's Library
Pages: 592
Product dimensions: 7.34(w) x 9.36(h) x 1.30(d)

Table of Contents

Acknowledgmentsxvii
Introductionxix
Part INetworks and Security
1Layering Architecture and the OSI Model3
Layering Principles4
Open Systems Interconnection (OSI) Model4
Peer Communications and Encapsulation8
Layer Interactions10
Summary19
2Network Architectures21
Networks and Network Topologies22
Local Area Networks (LANs)25
Wide Area Networks (WANs)46
3The TCP/IP Protocol Stack73
The DOD Reference Model Layers75
Protocol Descriptions77
TCP/IP Application Layer Protocols99
4Security105
What Is Security?106
Information Security Domains108
General Security Considerations111
Planning Your Security Approach113
Components of a Sound Security Architecture117
The Five Security Characteristics of Information118
The Three States of Information127
5Threats and Attack Methods129
Packet Sniffing130
Spoofing and Denial of Service Threats134
Spoofing135
Denial of Service151
Password Attacks154
Application Layer Attacks154
Summary157
6Intrusion Detection Systems159
Why Is Intrusion Detection Necessary?160
What Are Intrusion Detection Systems?161
IDS Detection Methods164
Assessment Architectures165
How to Know When You Have Been Attacked172
Honey Pots176
7Firewalls179
What Is a Firewall?180
Types of Firewalls182
Firewall Architectures198
Part IIVirtual Private Networks
8VPN Basics207
What Is a VPN?208
Internets, Intranets, and Extranets210
History of VPNs213
What Is Tunneling?217
Tunneling Protocols217
A Tunnel from the Past219
Tunnel Types220
Summary222
9VPN Architectures223
VPN Components and General Requirements224
VPN Architectures226
Types of VPNs234
Summary238
Part IIIVPN Protocols
10Tunneling Protocols241
Generic Routing Encapsulation (GRE)242
Point-to-Point Tunneling Protocol (PPTP)249
Summary259
11L2F and L2TP261
Access VPNs or VPDNs262
Layer 2 Forwarding (L2F) PROTOCOL263
Layer 2 Tunneling Protocol (L2TP)273
Summary296
Part IVSecure Communication
12Cryptography299
Cryptography300
Steganography305
Cryptographic Algorithm Methods307
Cryptanalysis309
Future Cryptographic Methods311
Summary312
13Cryptographic Algorithms313
Hash Algorithms314
Private-Key (Symmetric) Algorithms316
Public-Key (Asymmetric) Algorithms319
Summary326
14Certificates327
Digital Signatures329
Certificates334
Digital Signatures, Certificates, and Public Key Infrastructure (PKI)343
Summary346
15Authentication347
Human Identification348
Entity Authentication350
Authentication Protocols351
Terminal Access Controller Access Control System (TACACS), XTACACS, and TACACS+364
Summary372
Part VIPSec
16IPSec Components375
IPSec Background376
IPSec Components and Concept Overview380
The Authentication Header (AH) Protocol385
The Encapsulating Security Payload (ESP) Protocol390
Why Two Authentication Protocols?394
Security Associations and Policies395
Security Databases399
Summary402
17Key Management403
Key Management Concepts and Overview404
Perfect Forward Secrecy (PFS)406
Diffie-Hellman407
The Pseudo-Random Function408
Domain of Interpretation (DOI)408
Internet Security Association and Key Management Protocol (ISAKMP)408
IPSec IKE410
Summary416
18Key Management/Exchange Protocols417
In-Band and Out-of-Band Key Exchanges418
Diffie-Hellman Key Exchange419
Simple Key-Management for Internet Protocols (SKIP)420
Photuris421
SKEME422
Oakley423
ISAKMP424
The Internet Key Exchange (IKE) or ISAKMP/Oakley441
Negotiating Multiple Security Associations459
Using ISAKMP/Oakley with Remote Access460
Summary461
19IPSec Architecture and Implementation463
IPSec Architecture and Implementation464
Managing the Security Associations473
Security Association Databases479
Summary486
Part VIMPLS
20Quality of Service (QoS)491
Basic Terms492
What is Quality of Service (QoS)?494
Why do we need QoS?495
The QoS Framework509
QoS Protocols510
Traffic Engineering520
Summary522
21Traffic Engineering--Movement of Data523
Routing to Switching to Routing?524
Traffic Engineering 101526
Summary534
22MPLS Background535
What Is MPLS?536
Why Do We Need MPLS?537
History Behind MPLS539
Summary545
23MPLS Components and Concepts547
MPLS Components and Concepts548
Distribution of Label Information556
MPLS Virtual Private Networks (MPLS VPNs)561
Summary565
Index567
From the B&N Reads Blog

Customer Reviews