𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

IPsec virtual private network fundamentals: [an introduction to VPNs]

✍ Scribed by Carmouche, James Henry


Publisher
Cisco Press
Year
2006;2010
Tongue
English
Leaves
481
Series
Cisco Press Fundamentals Series
Edition
4th print
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


An introduction to designing and configuring Cisco IPsec VPNs Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutionsIPsec Virtual Private Network Fundamentalsprovides a basic working knowledge of IPsec on various Cisco routing and switching platforms. It provides the foundation necessary to understand the different components of Cisco IPsec implementation and how it can be successfully implemented in a variety of network topologies and markets (service provider, enterprise, financial, government). This book views IPsec as an emerging requirement in most major vertical markets, explaining the need for increased information authentication, confidentiality, and non-repudiation for secure transmission of confidential data. The book is written using a layered approach, starting with basic explanations of why IPsec was developed and the types of organizations relying on IPsec to secure data transmissions. It then outlines the basic IPsec/ISAKMP fundamentals that were developed to meet demand for secure data transmission. The book covers the design and implementation of IPsec VPN architectures using an array of Cisco products, starting with basic concepts and proceeding to more advanced topics including high availability solutions and public key infrastructure (PKI). Sample topology diagrams and configuration examples are provided in each chapter to reinforce the fundamentals expressed in text and to assist readers in translating concepts into practical deployment scenarios. Additionally, comprehensive case studies are incorporated throughout to map topics to real-world solutions.

✦ Table of Contents


Cover......Page 1
Contents......Page 10
Introduction......Page 18
Part I: Introductory Concepts and Configuration/Troubleshooting......Page 24
VPN Overview of Common Terms......Page 26
Characteristics of an Effective VPN......Page 27
VPN Technologies......Page 30
Common VPN Deployments......Page 46
Business Drivers for VPNs......Page 50
IPsec VPNs and the Cisco Security Framework......Page 52
Summary......Page 53
Overview of Cryptographic Components......Page 56
Public Key Encryption Methods......Page 67
The IP Security Protocol (IPsec)......Page 72
IKE and ISAKMP......Page 99
Summary......Page 121
Chapter 3 Basic IPsec VPN Topologies and Configurations......Page 126
Site-to-Site IPsec VPN Deployments......Page 128
Site-to-Site IPsec VPN Deployments and GRE (IPsec+GRE)......Page 142
Hub-and-Spoke IPsec VPN Deployments......Page 149
Remote Access VPN Deployments......Page 153
Summary......Page 159
IPsec Diagnostic Tools within Cisco IOS......Page 162
Common Configuration Issues with IPsec VPNs......Page 163
Architectural and Design Issues with IPsec VPNs......Page 192
Summary......Page 221
Part II: Designing VPN Architectures......Page 226
Chapter 5 Designing for High Availability......Page 228
Network and Path Redundancy......Page 229
IPSec Tunnel Termination Redundancy......Page 231
Managing Peer and Path Availability......Page 236
Managing Path Symmetry......Page 240
Load Balancing, Load Sharing, and High Availability......Page 243
Summary......Page 253
Using Multiple Crypto Interfaces for High Availability......Page 256
Stateless IPsec VPN High-Availability Alternatives......Page 263
Stateful IPsec VPN High-Availability Alternatives......Page 278
Summary......Page 284
Geographic IPsec VPN HA with Reverse Route Injection and Multiple IPsec Peers......Page 288
Geographic IPsec VPN High Availability with IPsec+GRE and Encrypted Routing Protocols......Page 299
Dynamic Multipoint Virtual Private Networks......Page 308
Summary......Page 316
Vendor Interoperability Impact on Peer Availability......Page 318
Vendor Interoperability Impact on Path Availability......Page 322
Vendor Interoperability Design Considerations and Options......Page 327
Summary......Page 332
Chapter 9 Solutions for Remote-Access VPN High Availability......Page 334
IPsec RAVPN Concentrator High Availability Using Virtual Interfaces for Tunnel Termination......Page 335
IPsec RAVPN Concentrator HA Using the VCA Protocol......Page 354
IPsec RAVPN Geographic HA Design Options......Page 363
Summary......Page 376
IPsec VPN Termination On-a-Stick......Page 380
In-Path Versus Out-of-Path Encryption with IPsec......Page 389
Separate Termination of IPsec and GRE (GRE-Offload)......Page 400
Summary......Page 407
Part III: Advanced Topics......Page 410
PKI Background......Page 412
PKI Components......Page 415
Life of a Public Key Certificate......Page 418
OCSP and CRL Scalability......Page 425
Case Studies and Sample Configurations......Page 426
Summary......Page 435
Dynamic Crypto Maps......Page 438
Tunnel Endpoint Discovery......Page 451
Case Studyβ€”Using Dynamic Addressing with Low-Maintenance Small Home Office Deployments......Page 453
Summary......Page 467
RFCs......Page 470
Web and Other Resources......Page 471
C......Page 473
D......Page 474
H......Page 475
I......Page 476
M–N–O......Page 477
Q–R......Page 478
S......Page 479
V......Page 480
W–X–Y–Z......Page 481


πŸ“œ SIMILAR VOLUMES


IPsec Virtual Private Network Fundamenta
✍ James Henry Carmouche πŸ“‚ Library πŸ“… 2006 πŸ› Cisco Press 🌐 English

An introduction to designing and configuring Cisco IPsec VPNsUnderstand the basics of the IPsec protocol and learn implementation best practicesStudy up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplaceLearn how to avoid common pitfalls related to IPse

A Technical Guide to IPSec Virtual Priva
✍ James S. Tiller πŸ“‚ Library πŸ“… 2000 🌐 English

What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become. A Technical Guide to IPSec Virtual Private Networks pro

IPSec VPN design the definitive design a
✍ Vijay Bollapragada, Mohamed Khalid, Scott Wainner πŸ“‚ Library πŸ“… 2005 πŸ› Cisco Press 🌐 English

IPSec VPN Design consists of three main sections. The first section provides a comprehensive introduction to the IPSec protocol, including IPSec Peer Models. This section also includes an introduction to site-to-site, network-based, and remote access VPNs. The second section is dedicated to an analy

IPSec VPN design the definitive design a
✍ Vijay Bollapragada, Mohamed Khalid, Scott Wainner πŸ“‚ Library πŸ“… 2005 πŸ› Cisco Press 🌐 English

<P style="MARGIN: 0in 0in 0pt" soNormal>The definitive design and deployment guide for secure virtual private networks</P> <UL> <LI>Learn about IPSec protocols and Cisco IOS IPSec packet processing <LI>Understand the differences between IPSec tunnel mode and transport mode <LI>Evaluate the IPS