Flylib.com
IPSec Virtual Private Network Fundamentals
IPSec Virtual Private Network Fundamentals
ISBN: 1587052075
EAN: 2147483647
Year: N/A
Pages: 113
Authors:
James Henry Carmouche
BUY ON AMAZON
IPsec Virtual Private Network Fundamentals
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Command Syntax Conventions
Introduction
Methodology
Who Should Read This Book?
How This Book Is Organized
Part I: Introductory Concepts and ConfigurationTroubleshooting
Chapter 1. Introduction to VPN Technologies
VPN Overview of Common Terms
Characteristics of an Effective VPN
VPN Technologies
Common VPN Deployments
Business Drivers for VPNs
IPsec VPNs and the Cisco Security Framework
Summary
Chapter 2. IPsec Fundamentals
Overview of Cryptographic Components
Public Key Encryption Methods
The IP Security Protocol (IPsec)
IKE and ISAKMP
Summary
Chapter 3. Basic IPsec VPN Topologies and Configurations
Site-to-Site IPsec VPN Deployments
Site-to-Site IPsec VPN Deployments and GRE (IPsecGRE)
Hub-and-Spoke IPsec VPN Deployments
Remote Access VPN Deployments
Summary
Chapter 4. Common IPsec VPN Issues
IPsec Diagnostic Tools within Cisco IOS
Common Configuration Issues with IPsec VPNs
Architectural and Design Issues with IPsec VPNs
Summary
Part II: Designing VPN Architectures
Chapter 5. Designing for High Availability
Network and Path Redundancy
IPSec Tunnel Termination Redundancy
Managing Peer and Path Availability
Managing Path Symmetry
Load Balancing, Load Sharing, and High Availability
Summary
Chapter 6. Solutions for Local Site-to-Site High Availability
Using Multiple Crypto Interfaces for High Availability
Stateless IPsec VPN High-Availability Alternatives
Stateful IPsec VPN High-Availability Alternatives
Summary
Chapter 7. Solutions for Geographic Site-to-Site High Availability
Geographic IPsec VPN HA with Reverse Route Injection and Multiple IPsec Peers
Geographic IPsec VPN High Availability with IPsecGRE and Encrypted Routing Protocols
Dynamic Multipoint Virtual Private Networks
Summary
Chapter 8. Handling Vendor Interoperability with High Availability
Vendor Interoperability Impact on Peer Availability
Vendor Interoperability Impact on Path Availability
Vendor Interoperability Design Considerations and Options
Summary
Chapter 9. Solutions for Remote-Access VPN High Availability
IPsec RAVPN Concentrator High Availability Using Virtual Interfaces for Tunnel Termination
IPsec RAVPN Concentrator HA Using the VCA Protocol
IPsec RAVPN Geographic HA Design Options
Summary
Chapter 10. Further Architectural Options for IPsec
IPsec VPN Termination On-a-Stick
In-Path Versus Out-of-Path Encryption with IPsec
Separate Termination of IPsec and GRE (GRE-Offload)
Summary
Part III: Advanced Topics
Chapter 11. Public Key Infrastructure and IPsec VPNs
PKI Background
PKI Components
Life of a Public Key Certificate
PKI and the IPSec Protocol SuiteWhere PKI Fits into the IPSec model
OCSP and CRL Scalability
Case Studies and Sample Configurations
Summary
Chapter 12. Solutions for Handling Dynamically Addressed Peers
Dynamic Crypto Maps
Tunnel Endpoint Discovery
Case StudyUsing Dynamic Addressing with Low-Maintenance Small Home Office Deployments
Summary
Appendix A. Resources
Books
RFCs
Web and Other Resources
Index
SYMBOL
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
V
W
X
IPSec Virtual Private Network Fundamentals
ISBN: 1587052075
EAN: 2147483647
Year: N/A
Pages: 113
Authors:
James Henry Carmouche
BUY ON AMAZON
VBScript Programmers Reference
Client-Side Web Scripting
Script Encoding
Adding VBScript to Your VB Applications
Appendix K The Variant Subtypes
Appendix L ActiveX Data Objects
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Exploring the R1C1 Cell Reference Style
Creating Simple Charts
Performing Statistical Tests
Introduction
Dealing with Complex Numbers
Visual C# 2005 How to Program (2nd Edition)
Introduction
Polymorphism Examples
LinkLabel Control
Wrap-Up
Session Tracking in Web Services
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 324 Flat Conductor Cable Type FCC
Article 336 Power and Control Tray Cable Type TC
Article 408: Switchboards and Panelboards
Article 701 Legally Required Standby Systems
Tables 11(A) and 11(B)
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
AIP-SSM Modules
Directing Traffic to the AIP-SSM
System Maintenance
Routing Protocols
VPN Monitoring
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Organizing and Estimating the Work
Risk-Adjusted Financial Management
Quantitative Time Management
Quantitative Methods in Project Contracts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies