Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Comparing, Designing, and Deploying VPNs
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Comparing, Designing, and Deploying VPNs

Comparing, Designing, and Deploying VPNs

Mark Lewis

1050 pages, parution le 05/05/2006

Résumé

A practical guide for comparing, designing, and deploying IPsec, MPLS Layer 3, L2TPv3, L2TPv2, AToM, and SSL virtual private networks

  • Explore the major VPN technologies and their applications, design, and configurations on the Cisco IOS® Router, Cisco® ASA 5500 Series, and the Cisco VPN 3000 Series Concentrator platforms
  • Compare the various VPN protocols and technologies, learn their advantages and disadvantages, and understand their real-world applications and methods of integration
  • Find out how to design and implement Secure Socket Layer (SSL) VPNs, including consideration of clientless operation, the Cisco SSL VPN Client, the Cisco Secure Desktop, file and web server access, e-mail proxies, and port forwarding
  • Learn how to deploy scalable and secure IPsec and L2TP remote access VPN designs, including consideration of authentication, encryption, split-tunneling, high availability, load-balancing, and NAT transparency
  • Master scalable IPsec site-to-site VPN design and implementation including configuration of security protocols and policies, multiprotocol/ multicast traffic transport, NAT/PAT traversal, quality of service (QoS), Dynamic Multipoint VPNs (DMVPNs), and public key infrastructure (PKI)

Virtual private networks (VPNs) enable organizations to connect offices or other sites over the Internet or a service provider network and allow mobile or home-based users to enjoy the same level of productivity as those who are in the same physical location as the central network. However, with so many flavors of VPNs available, companies and providers are often hard pressed to identify, design, and deploy the VPN solutions that are most appropriate for their particular network architecture and service needs.

Comparing, Designing, and Deploying VPNs brings together the most popular VPN technologies for convenient reference. The book examines the real-world operation, application, design, and configuration of the following site-to-site VPNs: Layer 2 Tunneling Protocol version 3 (L2TPv3)-based Layer 2 VPNs (L2VPN); Any Transport over MPLS (AToM)-based L2VPN; MPLS Layer 3-based VPNs; and IP Security (IPsec)-based VPNs. The book covers the same details for the following remote access VPNs: Layer 2 Tunneling Protocol version 2 (L2TPv2) VPNs; L2TPv3 VPNs; IPsec-based VPNs; and Secure Socket Layer (SSL) VPNs. Through the operation, application, and configuration details offered in each chapter, you'll learn how to compare and contrast the numerous types of VPN technologies, enabling you to consider all relevant VPN deployment options and select the VPN technologies that are most appropriate for your network.

Comparing, Designing, and Deploying VPNs begins with an introduction of the types of VPNs available. Subsequent chapters begin with an overview of the technology, followed by an examination of deployment pros and cons that you can use to determine if the particular VPN technology is appropriate for your network. Detailed discussion of design, deployment, and configuration make up the heart of each chapter. Appendix A offers insight into two multipoint emulated LAN services that can be deployed over a MAN or WAN: Virtual Private LAN Service (VPLS) and IP-only Private LAN Service (IPLS).

If you are a network architect, network engineer, network administrator, an IT manager, or CIO involved in selecting, designing, deploying, and supporting VPNs, you'll find Comparing, Designing, and Deploying VPNs to be an indispensable reference.

This book is part of the Cisco Press® Networking Technology Series, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Sommaire

  • Part I Understanding VPN Technology
    • Chapter 1 What Is a Virtual Private Network?
  • Part II Site-to-Site VPNs
    • Chapter 2 Designing and Deploying L2TPv3-Based Layer 2 VPNs
    • Chapters Designing and Implementing AToM-Based Layer 2 VPNs
    • Chapter 4 Designing MPLS Layer 3 Site-to-Site VPNs
    • Chapter 5 Advanced MPLS Layer 3 VPN Deployment Considerations
    • Chapter 6 Deploying Site-to-Site IPsec VPNs
    • Chapter? Scaling and Optimizing IPsec VPNs
  • Part III Remote Access VPNs
    • Chapter 8 Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
    • Chapter 9 Designing and Deploying IPsec Remote Access and Teleworker VPNs
    • Chapter 10 Designing and Building SSL Remote Access VPNs (WebVPN)
  • Part IV Appendixes
    • Appendix A VPLS and IPLS Layer 2 VPNs
    • Appendix B Answers to Review Questions
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Cisco Press
Auteur(s) Mark Lewis
Parution 05/05/2006
Nb. de pages 1050
Format 19 x 23
Couverture Broché
Poids 1735g
Intérieur Noir et Blanc
EAN13 9781587051791
ISBN13 978-1-58705-179-1

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription