A Guide to Virtual Private Networks
For the privacy you need at a cost you can afford, Virtual Private Networks use a constellation of technologies to create secure "tunnels" over regular Internet lines. This comprehensive guide explains everything you need to plan, build, and configure a VPN for your organization.
- Paperback | 200 pages
- 175.26 x 231.14 x 15.24mm | 317.51g
- 02 Feb 1999
- Pearson Education (US)
- Prentice Hall
- Upper Saddle River, United States
Table of contents
1. Virtual Private Networks (VPN) Overview. VPN Introduction and Benefits. Security Considerations for VPNs. VPN Solutions in the Marketplace. VPN Customer Scenarios.2. A Short Introduction to Cryptography. Terminology. Symmetric or Secret-Key Algorithms. Asymmetric or Public-Key Algorithms. Hash Functions. Digital Certificates and Certification Authorities. Random-Number Generators. Export/Import Restrictions on Cryptography.3. Description of IPSec. Concepts. Authentication Header (AH). Encapsulating Security Payload (ESP). Combining IPSec Protocols. Current IPSec Standards and Internet Drafts.4. The Internet Key Exchange (IKE) Protocol. Protocol Overview. Initializing Security Associations with ISAKMP/Oakley. Negotiating Multiple Security Associations. Using ISAKMP/Oakley with Remote Access.5. Branch Office Connection Scenario. Design Considerations. How Does It Work? Variations of the Branch Office Scenario.6. Business Partner/Supplier Network Scenario. Design Considerations. Manual Key Distribution. Variations of the Business Partner/Supplier Network Scenario.7. Remote Access Scenario. Design Considerations. An Insight View to Dynamic Tunnels.Appendix A. IBM eNetwork VPN Solutions. Appendix B. Troubleshooting Your VPN. Appendix C. Special Notices. Appendix D. Related Publications. List of Abbreviations. Index.