Virtual Private Networking: A Construction, Operation and Utilization GuideThis book provides network managers, LAN administrators and small business operators with all they need to know to "interconnect" multiple locations or travelling employees that need to access a single location. The operation and utilization of virtual private networks is discussed both in theory and practicality, covering the technical aspects associated with encryption and digital certificates as well as the manner by which readers can create VPNs using readily available products from Microsoft, Cisco, Checkpoint and possibly other vendors. The author was among the first to write about the concept of virtual private networking in a series of articles published over five years ago, and in the intervening years this has become a very hot topic - with the technology being increasing deployed by companies. Virtual Private Networking, by Gilbert Held, covers the technology and the theory, but also shows readers, through numerous examples, 'how to use ' the technology. |
Contents
Understanding Authentication and Encryption | 23 |
Understanding the TCPIP Protocol Suite | 53 |
Layer 2 Operations | 79 |
Copyright | |
4 other sections not shown
Other editions - View all
Virtual Private Networking: A Construction, Operation and Utilization Guide Gilbert Held Limited preview - 2005 |
Virtual Private Networking: A Construction, Operation and Utilization Guide Gilbert Held No preview available - 2005 |
Common terms and phrases
access concentrator algorithm application Asanté authentication methods button labeled byte Code field communications configuration control message create datagram default defined device dialog box digital certificate display enable encryption endpoint entry establish field value frame relay gateway hardware hash host ICMP messages illustrates indicates IP address IP datagram IP Filter list IP header IPSec IPSec policies ISAKMP key exchange L2TP layer locations Magic Cookie Message Type Microsoft MS-CHAP network server OK Cancel operations options packet password Payload port number portion of Figure PPTP previously Properties dialog box Protocol field public key Remote Access Policy remote client router Routing and Remote security association Security Method session shown in Figure specify subnet TCP/IP transmitted tunnel mode turn our attention vendors Virtual Private Networking VPN connection VPN service provider Windows wizard