List of Figures

Chapter 1: The Business Case for Virtual Private Networks

Figure 1.1: The many types of client computers today.

Chapter 2: VPN Overview

Figure 2-1: The VPN connection.
Figure 2-2: Using a VPN connection to connect a remote access client to an organization’s intranet.
Figure 2-3: Using a VPN connection to connect two remote sites.
Figure 2-4: Using a VPN connection to connect to a secured or hidden network.
Figure 2-5: Tunneling.
Figure 2-6: Structure of a PPTP packet containing an IP datagram.
Figure 2-7: Structure of an L2TP packet containing an IP datagram.
Figure 2-8: Encryption of L2TP traffic with IPSec ESP.

Chapter 3: VPN Security

Figure 3-1: Quaratine Control Operations

Chapter 4: VPN Interoperability

Figure 4-1: RFC Interoperable Standards Support

Chapter 5: Remote Access VPN Components and Design Points

Figure 5-1: Components of Windows remote access VPNs.

Chapter 7: Using Connection Manager for Quarantine Control and Certificate Provisioning

Figure 7-1: Connection Manager and quarantine basic lab setup.
Figure 7-2: CA identifying information.
Figure 7-3: Accessing DHCP Relay Agent properties.
Figure 7-4: Configuring DHCP Relay Agent properties.
Figure 7-5: Installing Connection Manager Administration Kit.
Figure 7-6: Configuring the Hosts file on the client.
Figure 7-7: Remote Access Policy attributes interface.
Figure 7-8: Configuring tunnel types on the Remote Access Policy.
Figure 7-9: Dial-In Constraints interface.
Figure 7-10: Advanced tab in the Edit Dial-In Profile dialog box.
Figure 7-11: Add Attribute interface.
Figure 7-12: Adding Attribute Information.
Figure 7-13: IP Filter Attribute Information.
Figure 7-14: Inbound Filters interface.
Figure 7-15: Add IP Filter interface.
Figure 7-16: Add IP Filter interface, the Destination Network.
Figure 7-17: Permit Inbound Filter interface.
Figure 7-18: Add Attribute interface.
Figure 7-19: Review the Remote Access Policies.
Figure 7-20: Autoenrollment activation.
Figure 7-21: Configuring a certificate template.
Figure 7-22: Permissions for a new template.
Figure 7-23: Configuring the Certificate Authority.
Figure 7-24: Rqs_setup.bat.
Figure 7-25: Remote Access Quarantine Agent service.
Figure 7-26: Creating the CM profile.
Figure 7-27: CMAK VPN Support dialog box.
Figure 7-28: Security settings.
Figure 7-29: Advanced Security Settings
Figure 7-30: New Custom Action interface.
Figure 7-31: New Custom Action interface for autoenrollment.
Figure 7-32: Custom Action, Additional Files dialog box
Figure 7-33: Selecting Advanced Customization.
Figure 7-34: CM Advanced Customization page.
Figure 7-35: Profile installation confirmation.
Figure 7-36: User access confirmation for profile.
Figure 7-37: User interface for Connection Manager on the client.

Chapter 8: Site-to-Site VPN Components and Design Points

Figure 8-1: Components of Windows Server 2003 site-to-site VPNs.

Chapter 9: Deploying Site-to-Site VPNs

Figure 9-1: Dynamic routing operations
Figure 9-2: Static routing operations
Figure 9-3: Dynamic and static routing with VPN services
Figure 9-4: Dynamic routing operations

Chapter 10: A VPN Deployment Example

Figure 10-1: The network configuration of the Contoso, LTD. VPN server.
Figure 10-2: The Contoso, LTD. VPN server that provides remote access VPN connections.
Figure 10-3: The Contoso, LTD. VPN server that provides on-demand branch office connections.
Figure 10-4: The Contoso, LTD. VPN server that provides persistent branch office connections.
Figure 10-5: The Contoso, LTD. VPN server that provides extranet connections for business partners.
Figure 10-6: The Contoso, LTD. RADIUS server that provides authentication and accounting for the VPN server and the remote access server.

Appendix B: Configuring Firewalls for VPN

Figure B-1: The VPN server in front of the firewall.
Figure B-2: The VPN server on the perimeter network, behind the firewall.
Figure B-3: The VPN server on the perimeter network, between two firewalls.

Appendix D: Setting Up Remote Access VPN Connections in a Test Lab

Figure D-1: Configuration of the VPN test lab.

Appendix E: Setting Up Connection Manager in a Test Lab

Figure E-1: The network topology of the Connection Manager test lab.

Appendix F: Setting Up a PPTP-Based Site-to-Site VPN Connection in a Test Lab

Figure F-1: Site-to-site VPN test lab configuration.

Deploying Virtual Private Networks With Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003 (Technical Reference)
ISBN: 0735615764
EAN: 2147483647
Year: 2006
Pages: 128

Similar book on Amazon © 2008-2017.
If you may any questions please contact us: