|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Charlie Scott , Charlie Scott , Paul WolfePublisher: O'Reilly Media Imprint: O'Reilly Media Edition: 2nd edition Dimensions: Width: 17.60cm , Height: 1.20cm , Length: 23.20cm Weight: 0.450kg ISBN: 9781565925298ISBN 10: 1565925297 Pages: 232 Publication Date: 26 January 1999 Recommended Age: From 18 to 99 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Awaiting stock ![]() The supplier is currently out of stock of this item. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out for you. Table of ContentsPreface 1. Why Build a Virtual Private Network? What Does a VPN Do? Security Risks of the Internet How VPNs Solve Internet Security Issues VPN Solutions A Note on IP Address and Domain Name Conventions Used in This Book 2. Basic VPN Technologies Firewall Deployment Encryption and Authentication VPN Protocols Methodologies for Compromising VPNs Patents and Legal Ramifications 3. Wide Area, Remote Access, and the VPN General WAN, RAS, and VPN Concepts VPN Versus WAN VPN Versus RAS 4. Implementing Layer 2 Connections Differences Between PPTP, L2F, and L2TP How PPTP Works Features of PPTP 5. Configuring and Testing Layer 2 Connections Installing and Configuring PPTP on a Windows NT RAS Server Configuring PPTP for Dial-up Networking on a Windows NT Client Configuring PPTP for Dial-up Networking on a Windows or 98 Client Enabling PPTP on Remote Access Switches Making the Calls Troubleshooting Problems Using PPTP with Other Security Measures 6. Implementing the AltaVista Tunnel Advantages of the AltaVista Tunnel System AltaVista Tunnel Limitations How the AltaVista Tunnel Works VPNs and AltaVista 7. Configuring and Testing the AltaVista Tunnel Getting Busy Installing the AltaVista Tunnel Configuring the AltaVista Tunnel Extranet and Telecommuter Server Configuring the AltaVista Telecommuter Client Troubleshooting Problems 8. Creating a VPN with the Unix Secure Shell The SSH Software Building and Installing SSH SSH Components Creating a VPN with PPP and SSH Troubleshooting Problems A Performance Evaluation 9. The Cisco PIX Firewall The Cisco PIX Firewall The PIX in Action Configuring the PIX as a Gateway Configuring the Other VPN Capabilities 10. Managing and Maintaining Your VPN Choosing an ISP Solving VPN Problems Delivering Quality of Service Security Suggestions Keeping Yourself Up-to-Date 11. A VPN Scenario The Topology Central Office Large Branch Office Small Branch Offices Remote Access Users A Network Diagram A. Emerging Internet Technologies B. Resources, Online and Otherwise IndexReviewsAuthor InformationCharlie Scott is the Senior Vice President of OuterNet Connection Strategies, Inc., an Internet service provider and outsource company based in Austin, Texas and specializing in innovative and emergent technologies. At OuterNet, he helps create and implement new products for their network operations center and co-location facilities. While an undergraduate at the University of Texas at Austin, Charlie was a research assistant in a cognitive science lab, and planned on going to graduate school in that field. He was eventually able to get his BA in Psychology. But he always enjoyed working with computers, and his exposure to the Internet at UT deviated him enough to abandon all plans for graduate school and start working with computer networks. The next few years saw him at Texas Instruments, IBM, and Wayne-Dresser before he helped found OuterNet. Charlie has also co-authored a half-dozen Internet-related books (many with Mike and Paul), on topics ranging from electronic commerce to CGI programming. He has also completed his MCSE and is working towards other certifications. When he finds spare time, Charlie likes to write and read fiction. He also enjoys spending time with his wife, Mary, and their four beautiful felines. Paul Wolfe has done everything from driving M1A1 tanks in Desert Storm to slinging computer chips for Motorola. He now divides his time between his family and his job, as well as writing. He has written four books in the last two years, covering such topics as Windows NT Web servers, Internet commerce, VRML, and Virtual Private Networks. Paul is currently a team leader for system builds, hardware inventory, and ISDN deployment for Tivoli Systems, an IBM company. He dreams of restoring his 1986 Toyota Tercel to its former glory and racing it on the stock car circuit. Mike Erwin is the President and Chief Executive Officer of OuterNet Connection Strategies, Inc. Mike has served these posts for the last four years, during which he also worked for Apple Computer, Inc., architecting and implementing connectivity, application, scripting and development support for Apple's Worldwide Support Center. Mr. Erwin is the co-author of several other works, including the CGI Bible, Building Web Commerce Sites, and the 60 Minute Guide to VRML. Mike's technology related interests involve encryption algorithms, super computing, Distributed Operating Systems, universe game simulations, and building secondary securities markets on the Net. Before becoming completely immersed in work, Mike used to find that his hobbies included playing hearts, drinking cheap vodka, staying up until dawn, and doodling with oil paints with his left hand. Mike's current favorite things include dabbling with theoretical and particle physics, martial arts training, gambling, securities prospecting, and, of course, sleeping. Tab Content 6Author Website:Countries AvailableAll regions |