𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Virtual Private Networks


Publisher
O'Reilly
Year
1998
Tongue
English
Leaves
206
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?The solution is a Virtual Private Network (VPN): a collection of technologies that creates secure connections or "tunnels" over regular Internet lines -- connections that can be easily used by anyone logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and UNIX.Topics include:

How the VPN compares to other available networking technologies
Encryption, firewalls, and other technologies that let VPNs work
VPN configuration (sample included)
Point to Point Tunneling Protocol (PPTP) and Level 2 Tunneling Protocol (L2TP)
The AltaVista Tunnel
The Cisco PIX Firewall
Maintenance and trouble-shooting
Upcoming technologies like IPsec and S/WAN

✦ Table of Contents


β€œPreface -- 1. Why Build A Virtual Private Network? -- 2. Basic Vpn Technologies -- 3. Wide Area, Remote Access, And The Vpn -- 4. Implementing Layer 2 Connections -- 5. Configuring And Testing Layer 2 Connections -- 6. Implementing The Alta Vista Tunnel 98 -- 7. Configuring And Testing The Altavista Tunnel -- 8. Creating A Vpn With The Unix Secure Shell -- 9. The Cisco Pix Firewall -- 10. Managing And Maintaining Your Vpn -- 11. A Vpn Scenario -- A. Emerging Internet Technologies -- B. Resources, Online And Otherwise -- Index. Charlie Scott, Paul Wolfe, And Mike Erwin. Turning The Internet Into Your Private Network--cover. Includes Bibliographical References And Index.

Includes bibliographical references and index

"Turning the Internet into your private network"--Cover”


πŸ“œ SIMILAR VOLUMES


Virtual Private Networks
✍ Mike Erwin, Charlie Scott, Paul Wolfe πŸ“‚ Library πŸ“… 1999 πŸ› O'Reilly 🌐 English

Provide a low-cost, secure electronic network for your organization. With 228 pages of instruction, this concise text teaches you how to build and plan a virtual private network. It examines PPTP, Cisco PIX Firewalls, SSH and the IPSec standard. It also explores practical issues, such as cost and co

Building a virtual private network
✍ Meeta Gupta πŸ“‚ Library πŸ“… 2003 πŸ› Premier Press 🌐 English

Your business must be connected in order to compete in the global marketplace. Employees need to know that their company's network is accessible at any time, from any place. A Virtual Private Network (VPN) accomplishes this by utilizing remote connectivity technologies that combine existing intern

Building & Managing Virtual Private Netw
✍ Dave Kosiur πŸ“‚ Library πŸ“… 1998 πŸ› Wiley 🌐 English

Everything you need to know about selecting, designing, building, and managing the right VPN for your company Building and Managing Virtual Private Networks Get complete answers to all your VPN questions in Building and Managing Virtual Private Networks. International networking guru Dave Kosiur pro