Flylib.com
IPSec Virtual Private Network Fundamentals
IPSec Virtual Private Network Fundamentals
ISBN: 1587052075
EAN: 2147483647
Year: N/A
Pages: 113
Authors:
James Henry Carmouche
BUY ON AMAZON
IPsec Virtual Private Network Fundamentals
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Command Syntax Conventions
Introduction
Methodology
Who Should Read This Book?
How This Book Is Organized
Part I: Introductory Concepts and ConfigurationTroubleshooting
Chapter 1. Introduction to VPN Technologies
VPN Overview of Common Terms
Characteristics of an Effective VPN
VPN Technologies
Common VPN Deployments
Business Drivers for VPNs
IPsec VPNs and the Cisco Security Framework
Summary
Chapter 2. IPsec Fundamentals
Overview of Cryptographic Components
Public Key Encryption Methods
The IP Security Protocol (IPsec)
IKE and ISAKMP
Summary
Chapter 3. Basic IPsec VPN Topologies and Configurations
Site-to-Site IPsec VPN Deployments
Site-to-Site IPsec VPN Deployments and GRE (IPsecGRE)
Hub-and-Spoke IPsec VPN Deployments
Remote Access VPN Deployments
Summary
Chapter 4. Common IPsec VPN Issues
IPsec Diagnostic Tools within Cisco IOS
Common Configuration Issues with IPsec VPNs
Architectural and Design Issues with IPsec VPNs
Summary
Part II: Designing VPN Architectures
Chapter 5. Designing for High Availability
Network and Path Redundancy
IPSec Tunnel Termination Redundancy
Managing Peer and Path Availability
Managing Path Symmetry
Load Balancing, Load Sharing, and High Availability
Summary
Chapter 6. Solutions for Local Site-to-Site High Availability
Using Multiple Crypto Interfaces for High Availability
Stateless IPsec VPN High-Availability Alternatives
Stateful IPsec VPN High-Availability Alternatives
Summary
Chapter 7. Solutions for Geographic Site-to-Site High Availability
Geographic IPsec VPN HA with Reverse Route Injection and Multiple IPsec Peers
Geographic IPsec VPN High Availability with IPsecGRE and Encrypted Routing Protocols
Dynamic Multipoint Virtual Private Networks
Summary
Chapter 8. Handling Vendor Interoperability with High Availability
Vendor Interoperability Impact on Peer Availability
Vendor Interoperability Impact on Path Availability
Vendor Interoperability Design Considerations and Options
Summary
Chapter 9. Solutions for Remote-Access VPN High Availability
IPsec RAVPN Concentrator High Availability Using Virtual Interfaces for Tunnel Termination
IPsec RAVPN Concentrator HA Using the VCA Protocol
IPsec RAVPN Geographic HA Design Options
Summary
Chapter 10. Further Architectural Options for IPsec
IPsec VPN Termination On-a-Stick
In-Path Versus Out-of-Path Encryption with IPsec
Separate Termination of IPsec and GRE (GRE-Offload)
Summary
Part III: Advanced Topics
Chapter 11. Public Key Infrastructure and IPsec VPNs
PKI Background
PKI Components
Life of a Public Key Certificate
PKI and the IPSec Protocol SuiteWhere PKI Fits into the IPSec model
OCSP and CRL Scalability
Case Studies and Sample Configurations
Summary
Chapter 12. Solutions for Handling Dynamically Addressed Peers
Dynamic Crypto Maps
Tunnel Endpoint Discovery
Case StudyUsing Dynamic Addressing with Low-Maintenance Small Home Office Deployments
Summary
Appendix A. Resources
Books
RFCs
Web and Other Resources
Index
SYMBOL
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
V
W
X
IPSec Virtual Private Network Fundamentals
ISBN: 1587052075
EAN: 2147483647
Year: N/A
Pages: 113
Authors:
James Henry Carmouche
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
Schedule Planning
Cost Planning
Comprehensive Project Plan
Project Control
Appendix A Systems Development Life Cycle
Network Security Architectures
Threat Mitigation
Management Problems Will Continue
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
The ROI of Lean Six Sigma for Services
Seeing Services Through Your Customers Eyes-Becoming a customer-centered organization
The Value in Conquering Complexity
Phase 1 Readiness Assessment
Phase 3 Mobilization
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Office Object Models
Conclusion
Conclusion
Form Security
Trusting the Document
.NET-A Complete Development Cycle
Implementing Dynamically Loadable Image Postprocessing Plugins
Unit Tests
Conclusion
Security and Database Access
Putting It All Together
Understanding Digital Signal Processing (2nd Edition)
THE DFT FREQUENCY RESPONSE TO A COMPLEX INPUT
RADIX-2 FFT BUTTERFLY STRUCTURES
HALF-BAND FIR FILTERS
FREQUENCY SAMPLING FILTERS: THE LOST ART
Section G.1. FREQUENCY RESPONSE OF A COMB FILTER
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies