| |
| |
Preface | |
| |
| |
| |
Why Build a Virtual Private Network? | |
| |
| |
What Does a VPN Do? | |
| |
| |
Security Risks of the Internet | |
| |
| |
How VPNs Solve Internet Security Issues | |
| |
| |
VPN Solutions | |
| |
| |
A Note on IP Address and Domain Name Conventions Used in This Book | |
| |
| |
| |
Basic VPN Technologies Firewall Deployment | |
| |
| |
Encryption and Authentication | |
| |
| |
VPN Protocols | |
| |
| |
Methodologies for Compromising VPNs | |
| |
| |
Patents and Legal Ramifications | |
| |
| |
| |
Wide Area, Remote Access, and the VPN General WAN, RAS, and VPN | |
| |
| |
Concepts | |
| |
| |
VPN Versus WAN | |
| |
| |
VPN Versus RAS | |
| |
| |
| |
Implementing Layer | |
| |
| |
Connections Differences Between PPTP, L2F, and L2TP | |
| |
| |
How PPTP Works 64 Features of PPTP | |
| |
| |
| |
Configuring and Testing Layer | |
| |
| |
Connections Installing and Configuring PPTP on a Windows NT RAS Server | |
| |
| |
Configuring PPTP for Dial-up Networking on a Windows NT Client | |
| |
| |
Configuring PPTP for Dial-up Networking on a Windows 95 or | |
| |
| |
Client | |
| |
| |
Enabling PPTP on Remote Access Switches | |
| |
| |
Making the Calls | |
| |
| |
Troubleshooting Problems | |
| |
| |
Using PPTP with Other Security Measures | |
| |
| |
| |
Implementing the AltaVista Tunnel | |
| |
| |
Advantages of the AltaVista Tunnel System | |
| |
| |
AltaVista Tunnel Limitations | |
| |
| |
How the AltaVista Tunnel Works | |
| |
| |
VPNs and AltaVista | |
| |
| |
| |
Configuring and Testing the AltaVista Tunnel Getting Busy | |
| |
| |
Installing the AltaVista Tunnel | |
| |
| |
Configuring the AltaVista Tunnel Extranet and Telecommuter Server | |
| |
| |
Configuring the AltaVista Telecommuter Client | |
| |
| |
Troubleshooting Problems | |
| |
| |
| |
Creating a VPN with the Unix Secure Shell The SSH Software | |
| |
| |
Building and Installing SSH | |
| |
| |
SSH Components | |
| |
| |
Creating a VPN with PPP and SSH | |
| |
| |
Troubleshooting Problems | |
| |
| |
A Performance Evaluation | |
| |
| |
| |
The Cisco PIX Firewall The Cisco PIX Firewall | |
| |
| |
The PIX in Action | |
| |
| |
Configuring the PIX as a Gateway | |
| |
| |
Configuring the Other VPN Capabilities | |
| |
| |
| |
Managing and Maintaining Your VPN Choosing an ISP | |
| |
| |
Solving VPN Problems | |
| |
| |
Delivering Quality of Service | |
| |
| |
Security Suggestions | |
| |
| |
Keeping Yourself Up-to-Date | |
| |
| |
| |
A VPN Scenario The Topology | |
| |
| |
Central Office | |
| |
| |
Large Branch Office | |
| |
| |
Small Branch Offices | |
| |
| |
Remote Access Users | |
| |
| |
A Network Diagram | |
| |
| |
A. Emerging Internet Technologies | |
| |
| |
B. Resources, Online and Otherwise | |
| |
| |
Index | |