Read more
Ideal for connecting branch offices and remote workers, Virtual Private Networks (VPNs) provide a cost-effective, secure method for connecting to a network. This book is a step-by-step guide to deploying one of the fastest growing methods for remote access, global connections, and extranet connectivity. From understanding VPN technology to security features of VPN to actual implementations, this book covers it all.
List of contents
Part I: Networks and Security
Chapter 1: Layering Architecture and the OSI Model
Chapter 2: Network Architectures
Chapter 3: The TCP/IP Protocol Stack
Chapter 4: Security
Chapter 5: Threats and Attack Methods
Chapter 6: Intrusion Detection Systems
Chapter 7: Firewalls
Part II: Virtual Private Networks
Chapter 8: VPN Basics
Chapter 9: VPN Architectures
Part III: VPN Protocols
Chapter 10: Tunneling Protocols
Chapter 11: L2F and L2TP
Part IV: Secure Communication
Chapter 12: Cryptography
Chapter 13: Cryptographic Algorithms
Chapter 14: Certificates
Chapter 15: Authentication
Part V: IPSec
Chapter 16: IPSec Components
Chapter 17: Key Management
Chapter 18: Key Management/Exchange Protocols
Chapter 19: IPSec Architecture and Implementation
Part VI: MPLS
Chapter 20: Quality of Service (QoS)
Chapter 21: Traffic Engineering-Movement of Data
Chapter 22: MPLS Background
Chapter 23: MPLS Components and Concepts
About the author
John Mairs, CCNA, CCDA,MCSE MCP (San Francisco, CA) has been a network administrator and security systems consultant for more than 14 years. John is currently a systems Engineer for GE Capital Information Technology Services where he handles the global enterprise networks and networking security for a Fortune 500 Company. He is a published author and contributed six chapters to Cisco Router Handbook.