๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Virtual Private Networks, Second Edition

โœ Scribed by Mike Erwin


Publisher
O'Reilly
Year
1998
Tongue
English
Leaves
181
Edition
2nd ed
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Cover......Page 1
Table of Contents......Page 3
Contents of This Book......Page 5
Conventions Used in This Book......Page 7
Acknowledgments......Page 8
1.1 What Does a VPN Do?......Page 10
1.2 Security Risks of the Internet......Page 12
1.3 How VPNs Solve Internet Security Issues......Page 13
1.4 VPN Solutions......Page 16
1.5 A Note on IP Address and Domain Name Conventions Used in This Book......Page 17
2.1 Firewall Deployment......Page 18
2.2 Encryption and Authentication......Page 28
2.3 VPN Protocols......Page 36
2.4 Methodologies for Compromising VPNs......Page 40
2.5 Patents and Legal Ramifications......Page 44
3.1 General WAN, RAS, and VPN Concepts......Page 46
3.2 VPN Versus WAN......Page 48
3.3 VPN Versus RAS......Page 54
4.1 Differences Between PPTP, L2F, and L2TP......Page 61
4.2 How PPTP Works......Page 62
4.3 Features of PPTP......Page 71
5.1 Installing and Configuring PPTP on a Windows NT RAS Server......Page 73
5.2 Configuring PPTP for Dial-up Networking on a Windows NT Client......Page 80
5.3 Configuring PPTP for Dial-up Networking on a Windows 95 or 98 Client......Page 81
5.4 Enabling PPTP on Remote Access Switches......Page 84
5.5 Making the Calls......Page 87
5.6 Troubleshooting Problems......Page 88
5.7 Using PPTP with Other Security Measures......Page 91
6. Implementing the AltaVista Tunnel 98......Page 93
6.1 Advantages of the AltaVista Tunnel System......Page 94
6.2 AltaVista Tunnel Limitations......Page 95
6.3 How the AltaVista Tunnel Works......Page 96
6.4 VPNs and AltaVista......Page 100
7.2 Installing the AltaVista Tunnel......Page 111
7.3 Configuring the AltaVista Tunnel Extranet and Telecommuter Server......Page 114
7.4 Configuring the AltaVista Telecommuter Client......Page 120
7.5 Troubleshooting Problems......Page 121
8. Creating a VPN with the Unix Secure Shell......Page 124
8.1 The SSH Software......Page 125
8.2 Building and Installing SSH......Page 126
8.3 SSH Components......Page 127
8.4 Creating a VPN with PPP and SSH......Page 132
8.5 Troubleshooting Problems......Page 144
8.6 A Performance Evaluation......Page 146
9.2 The PIX in Action......Page 148
9.3 Configuring the PIX as a Gateway......Page 154
9.4 Configuring the Other VPN Capabilities......Page 160
10.1 Choosing an ISP......Page 163
10.2 Solving VPN Problems......Page 164
10.3 Delivering Quality of Service......Page 167
10.4 Security Suggestions......Page 168
10.5 Keeping Yourself Up-to-Date......Page 170
11.2 Central Office......Page 171
11.3 Large Branch Office......Page 172
11.5 Remote Access Users......Page 173
11.6 A Network Diagram......Page 174
A.1 IPv6......Page 175
A.3 S/WAN......Page 176
B.3 CERT Advisories......Page 178
B.6 Usenet Newsgroups......Page 179
B.7 Mailing Lists......Page 180
Colophon......Page 181


๐Ÿ“œ SIMILAR VOLUMES


Virtual Private Networks
๐Ÿ“‚ Library ๐Ÿ“… 1998 ๐Ÿ› O'Reilly ๐ŸŒ English

Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in whi

Virtual Private Networks
โœ Mike Erwin, Charlie Scott, Paul Wolfe ๐Ÿ“‚ Library ๐Ÿ“… 1999 ๐Ÿ› O'Reilly ๐ŸŒ English

Provide a low-cost, secure electronic network for your organization. With 228 pages of instruction, this concise text teaches you how to build and plan a virtual private network. It examines PPTP, Cisco PIX Firewalls, SSH and the IPSec standard. It also explores practical issues, such as cost and co

Virtual Private Networks, 2nd Edition (O
โœ Mike Erwin, Charlie Scott, Paul Wolfe ๐Ÿ“‚ Library ๐Ÿ“… 1998 ๐Ÿ› O'Reilly Media ๐ŸŒ English

I didn't check out the publication date of this book when I bought it (1998) so my dissapointment is partly my fault. It is, unsuprisingly, very outdated (anyone actually remember the altavista tunnel?). However, much of the info that remains, even general VPN fundamentals, are flawed and innacura

Building a virtual private network
โœ Meeta Gupta ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Premier Press ๐ŸŒ English

Your business must be connected in order to compete in the global marketplace. Employees need to know that their company's network is accessible at any time, from any place. A Virtual Private Network (VPN) accomplishes this by utilizing remote connectivity technologies that combine existing intern