Share
Fr. 55.50
Erwin, Michael Erwin, Mike Erwin, Scot, SCOTT, Charlie Scott...
Virtual Private Networks - Turning the Internet Into Your Private Network
English · Paperback / Softback
Shipping usually within 3 to 5 weeks
Description
Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?
The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution.
This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).
New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support.
Topics include:How the VPN compares to other available networking technologies - Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work - Point to Point Tunneling Protocol (PPTP) and L2TP - The Altavista Tunnel - The Cisco PIX Firewall - Secure Shell (SSH) - Maintenance and troubleshooting.
List of contents
Preface
Chapter 1: Why Build a Virtual Private Network?
Chapter 2: Basic VPN Technologies
Chapter 3: Wide Area, Remote Access, and the VPN
Chapter 4: Implementing Layer 2 Connections
Chapter 5: Configuring and Testing Layer 2 Connections
Chapter 6: Implementing the AltaVista Tunnel 98
Chapter 7: Configuring and Testing the AltaVista Tunnel
Chapter 8: Creating a VPN with the Unix Secure Shell
Chapter 9: The Cisco PIX Firewall
Chapter 10: Managing and Maintaining Your VPN
Chapter 11: A VPN Scenario
Emerging Internet Technologies
Resources, Online and Otherwise
Colophon
About the author
Summary
A guide to setting up systems that can utilize the Internet to access and send information from one network to another, yet remain secure from unauthorized viewers. Four specific solutions are treated, including Layer two tunneling through PPTP or L2TP.
Product details
Authors | Erwin, Michael Erwin, Mike Erwin, Scot, SCOTT, Charlie Scott, Scott Charlie, Wolf, Wolfe, Paul Wolfe |
Publisher | O'Reilly Media |
Languages | English |
Product format | Paperback / Softback |
Released | 01.01.1998 |
EAN | 9781565925298 |
ISBN | 978-1-56592-529-8 |
No. of pages | 232 |
Weight | 375 g |
Series |
Animal |
Subjects |
Natural sciences, medicine, IT, technology
> IT, data processing
> Data communication, networks
Virtual Reality, COMPUTERS / Networking / General, Data encryption, Computer networking & communications, COMPUTERS / Virtual & Augmented Reality, COMPUTERS / Security / Cryptography & Encryption, Computer networking and communications |
Customer reviews
No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.
Write a review
Thumbs up or thumbs down? Write your own review.