Skip to content

Virtual Private Networks

Best in textbook rentals since 2012!

ISBN-10: 1565925297

ISBN-13: 9781565925298

Edition: 2nd 1998

Authors: Charlie Scott, Paul Wolfe, Mike Erwin, Andy Oram

List price: $39.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

This book tells you how to plan and build a virtual private network, a collection of technologies that creates secure connections or "tunnels" over regular Internet lines. It starts with general concerns like costs and configuration and continues with detailed descriptions of how to install and use useful technologies that are available for Windows NT and UNIX, such as PPTP, the Altavista Tunnel, and the Cisco PIX Firewall.
Customers also bought

Book details

List price: $39.99
Edition: 2nd
Copyright year: 1998
Publisher: O'Reilly Media, Incorporated
Publication date: 12/28/1998
Binding: Paperback
Pages: 230
Size: 7.25" wide x 9.50" long x 0.75" tall
Weight: 0.990
Language: English

Preface
Why Build a Virtual Private Network?
What Does a VPN Do?
Security Risks of the Internet
How VPNs Solve Internet Security Issues
VPN Solutions
A Note on IP Address and Domain Name Conventions Used in This Book
Basic VPN Technologies Firewall Deployment
Encryption and Authentication
VPN Protocols
Methodologies for Compromising VPNs
Patents and Legal Ramifications
Wide Area, Remote Access, and the VPN General WAN, RAS, and VPN
Concepts
VPN Versus WAN
VPN Versus RAS
Implementing Layer
Connections Differences Between PPTP, L2F, and L2TP
How PPTP Works 64 Features of PPTP
Configuring and Testing Layer
Connections Installing and Configuring PPTP on a Windows NT RAS Server
Configuring PPTP for Dial-up Networking on a Windows NT Client
Configuring PPTP for Dial-up Networking on a Windows 95 or
Client
Enabling PPTP on Remote Access Switches
Making the Calls
Troubleshooting Problems
Using PPTP with Other Security Measures
Implementing the AltaVista Tunnel
Advantages of the AltaVista Tunnel System
AltaVista Tunnel Limitations
How the AltaVista Tunnel Works
VPNs and AltaVista
Configuring and Testing the AltaVista Tunnel Getting Busy
Installing the AltaVista Tunnel
Configuring the AltaVista Tunnel Extranet and Telecommuter Server
Configuring the AltaVista Telecommuter Client
Troubleshooting Problems
Creating a VPN with the Unix Secure Shell The SSH Software
Building and Installing SSH
SSH Components
Creating a VPN with PPP and SSH
Troubleshooting Problems
A Performance Evaluation
The Cisco PIX Firewall The Cisco PIX Firewall
The PIX in Action
Configuring the PIX as a Gateway
Configuring the Other VPN Capabilities
Managing and Maintaining Your VPN Choosing an ISP
Solving VPN Problems
Delivering Quality of Service
Security Suggestions
Keeping Yourself Up-to-Date
A VPN Scenario The Topology
Central Office
Large Branch Office
Small Branch Offices
Remote Access Users
A Network Diagram
A. Emerging Internet Technologies
B. Resources, Online and Otherwise
Index