Virtual Private Networks

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?The solution is a Virtual Private Network (VPN): a collection of technologies that creates secure connections or "tunnels" over regular Internet lines -- connections that can be easily used by anyone logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and UNIX.Topics include: How the VPN compares to other available networking technologies Encryption, firewalls, and other technologies that let VPNs work VPN configuration (sample included) Point to Point Tunneling Protocol (PPTP) and Level 2 Tunneling Protocol (L2TP) The AltaVista Tunnel The Cisco PIX Firewall Maintenance and trouble-shooting Upcoming technologies like IPsec and S/WAN

Edition: 1
Publisher: O'Reilly
Year: 1998

Language: English
Pages: 206
City: Sebastopol, CA

“Preface -- 1. Why Build A Virtual Private Network? -- 2. Basic Vpn Technologies -- 3. Wide Area, Remote Access, And The Vpn -- 4. Implementing Layer 2 Connections -- 5. Configuring And Testing Layer 2 Connections -- 6. Implementing The Alta Vista Tunnel 98 -- 7. Configuring And Testing The Altavista Tunnel -- 8. Creating A Vpn With The Unix Secure Shell -- 9. The Cisco Pix Firewall -- 10. Managing And Maintaining Your Vpn -- 11. A Vpn Scenario -- A. Emerging Internet Technologies -- B. Resources, Online And Otherwise -- Index. Charlie Scott, Paul Wolfe, And Mike Erwin. Turning The Internet Into Your Private Network--cover. Includes Bibliographical References And Index.

Includes bibliographical references and index

"Turning the Internet into your private network"--Cover”