Flylib.com
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Mark Lewis
BUY ON AMAZON
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
What Is a Virtual Private Network?
VPN Devices
Deploying Site-to-Site and Remote Access VPNs: A Comparison
Summary
Review Questions
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Benefits and Drawbacks of L2TPv3-Based L2VPNs
L2TPv3 Pseudowire Operation
Configuring and Verifying L2TPv3 Pseudowires
Summary
Review Questions
Designing and Implementing AToM-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Benefits and Drawbacks of AToM-Based L2VPNs
AToM Pseudowire Operation
Deploying AToM Pseudowires
Implementing Advanced AToM Features
Summary
Review Questions
Designing MPLS Layer 3 Site-to-Site VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advantages and Disadvantages of MPLS Layer 3 VPNs
MPLS Layer 3 VPNs Overview
A Detailed Examination of MPLS Layer 3 VPNs
Deploying MPLS Layer 3 VPNs
Summary
Review Questions
Advanced MPLS Layer 3 VPN Deployment Considerations
Advanced MPLS Layer 3 VPN Deployment Considerations
The Carriers Carrier Architecture
The Inter-Autonomous System/Interprovider MPLS VPN Architecture
Supporting Multicast Transport in MPLS Layer 3 VPNs
Implementing QoS for MPLS Layer 3 VPNs
Supporting IPv6 Traffic Transport in MPLS Layer 3 VPNs Using 6VPE
Summary
Review Questions
Deploying Site-to-Site IPsec VPNs
Deploying Site-to-Site IPsec VPNs
Advantages and Disadvantages of IPsec Site-to-Site VPNs
IPsec: A Security Architecture for IP
Deploying IPsec VPNs: Fundamental Considerations
Summary
Review Questions
Scaling and Optimizing IPsec VPNs
Scaling and Optimizing IPsec VPNs
Scaling IPsec Virtual Private Networks
Ensuring High Availability in an IPsec VPN
Designing QoS for IPsec VPNs
MTU and Fragmentation Considerations in an IPsec VPN
Summary
Review Questions
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Benefits and Drawbacks of L2TP Remote Access VPNs
Operation of L2TP Voluntary/Client-Initiated Tunnel Mode
Implementing L2TP Voluntary/Client-Initiated Tunnel Mode Remote Access VPNs
Designing and Implementing L2TP Compulsory/NAS-Initiated Tunnel Mode Remote Access VPNs
Integrating L2TP Remote Access VPNs with MPLS VPNs
Summary
Review Questions
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Comparing IPsec Remote Access VPNs with Other Types of Remote Access VPNs
Understanding IKE in an IPsec Remote Access VPN Environment
Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication
Summary
Review Questions
Designing and Building SSL Remote Access VPNs (WebVPN)
Designing and Building SSL Remote Access VPNs (WebVPN)
Comparing SSL VPNs to Other Types of Remote Access VPNs
Understanding the Operation of SSL Remote Access VPNs
Using Clientless SSL Remote Access VPNs (WebVPN) on the Cisco VPN 3000 Concentrator
Implementing Full Network Access Using the Cisco SSL VPN Client
Strengthening SSL Remote Access VPNs Security by Implementing Cisco Secure Desktop
Enabling SSL VPNs (WebVPN) on Cisco IOS Devices
Deploying SSL VPNs (WebVPN) on the ASA 5500
Summary
Review Questions
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix A. VPLS and IPLS Layer 2 VPNs
Understanding VPLS
Understanding IPLS
Summary: Comparing VPLS and IPLS
Appendix B. Answers to Review Questions
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Mark Lewis
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Welcome to DarkBASIC
Making Programs Think Branching Statements and Subroutines
Game Graphics Learning to Use Bitmaps
Playing Intro Movies and Cut-Scenes
Multiplayer Programming The Crazy Carnage Game
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Importing Data from Text Files
Building 3D Surface Plots
Introduction
Recruiting Solver to Iteratively Solve Finite Difference Equations
Computing Present Value
An Introduction to Design Patterns in C++ with Qt 4
Inheritance and Polymorphism
Point of Departure
Iteration
Pointer Pathology
Section C.5. Open-Source IDEs and Development Tools
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Why Office Programming?
Working with the Windows Collections
Programming Research Services
Strong Names
Exporting the Mapped XML in the Document to an XML Data File
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Codes, Standards, and Safety Practices
Home Lighting Devices
Water Management Systems
Home Access Control Systems
Appendix A Home Technology Project Management
User Interfaces in C#: Windows Forms and Custom Controls
Control Class Basics
Classic Controls
Modern Controls
Data Controls
Help and Application-Embedded Support
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies