Flylib.com
IPSec Virtual Private Network Fundamentals
IPSec Virtual Private Network Fundamentals
ISBN: 1587052075
EAN: 2147483647
Year: N/A
Pages: 113
Authors:
James Henry Carmouche
BUY ON AMAZON
IPsec Virtual Private Network Fundamentals
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Command Syntax Conventions
Introduction
Methodology
Who Should Read This Book?
How This Book Is Organized
Part I: Introductory Concepts and ConfigurationTroubleshooting
Chapter 1. Introduction to VPN Technologies
VPN Overview of Common Terms
Characteristics of an Effective VPN
VPN Technologies
Common VPN Deployments
Business Drivers for VPNs
IPsec VPNs and the Cisco Security Framework
Summary
Chapter 2. IPsec Fundamentals
Overview of Cryptographic Components
Public Key Encryption Methods
The IP Security Protocol (IPsec)
IKE and ISAKMP
Summary
Chapter 3. Basic IPsec VPN Topologies and Configurations
Site-to-Site IPsec VPN Deployments
Site-to-Site IPsec VPN Deployments and GRE (IPsecGRE)
Hub-and-Spoke IPsec VPN Deployments
Remote Access VPN Deployments
Summary
Chapter 4. Common IPsec VPN Issues
IPsec Diagnostic Tools within Cisco IOS
Common Configuration Issues with IPsec VPNs
Architectural and Design Issues with IPsec VPNs
Summary
Part II: Designing VPN Architectures
Chapter 5. Designing for High Availability
Network and Path Redundancy
IPSec Tunnel Termination Redundancy
Managing Peer and Path Availability
Managing Path Symmetry
Load Balancing, Load Sharing, and High Availability
Summary
Chapter 6. Solutions for Local Site-to-Site High Availability
Using Multiple Crypto Interfaces for High Availability
Stateless IPsec VPN High-Availability Alternatives
Stateful IPsec VPN High-Availability Alternatives
Summary
Chapter 7. Solutions for Geographic Site-to-Site High Availability
Geographic IPsec VPN HA with Reverse Route Injection and Multiple IPsec Peers
Geographic IPsec VPN High Availability with IPsecGRE and Encrypted Routing Protocols
Dynamic Multipoint Virtual Private Networks
Summary
Chapter 8. Handling Vendor Interoperability with High Availability
Vendor Interoperability Impact on Peer Availability
Vendor Interoperability Impact on Path Availability
Vendor Interoperability Design Considerations and Options
Summary
Chapter 9. Solutions for Remote-Access VPN High Availability
IPsec RAVPN Concentrator High Availability Using Virtual Interfaces for Tunnel Termination
IPsec RAVPN Concentrator HA Using the VCA Protocol
IPsec RAVPN Geographic HA Design Options
Summary
Chapter 10. Further Architectural Options for IPsec
IPsec VPN Termination On-a-Stick
In-Path Versus Out-of-Path Encryption with IPsec
Separate Termination of IPsec and GRE (GRE-Offload)
Summary
Part III: Advanced Topics
Chapter 11. Public Key Infrastructure and IPsec VPNs
PKI Background
PKI Components
Life of a Public Key Certificate
PKI and the IPSec Protocol SuiteWhere PKI Fits into the IPSec model
OCSP and CRL Scalability
Case Studies and Sample Configurations
Summary
Chapter 12. Solutions for Handling Dynamically Addressed Peers
Dynamic Crypto Maps
Tunnel Endpoint Discovery
Case StudyUsing Dynamic Addressing with Low-Maintenance Small Home Office Deployments
Summary
Appendix A. Resources
Books
RFCs
Web and Other Resources
Index
SYMBOL
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
V
W
X
IPSec Virtual Private Network Fundamentals
ISBN: 1587052075
EAN: 2147483647
Year: N/A
Pages: 113
Authors:
James Henry Carmouche
BUY ON AMAZON
MySQL Stored Procedure Programming
MySQL Stored Programming Tutorial
Options for Using MySQL with PHP
Conclusion
Tuning Subqueries
Performance
Absolute Beginner[ap]s Guide to Project Management
One Title, Many Roles
Qualities of Successful Project Managers
Why Is the WBS Important?
Estimating the Work
Leveraging Earned Value Management Concepts
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Integrating Cisco CME in a SIP Network
Summary
Cisco IPC Express General Administration and Initial System Setup
Summary
Troubleshooting Mailbox GUI Configuration Problems
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Obtaining GNU make
Specifying a Command-Line Option from Your IDE
Add Margins to a Text File
Introduction
Introduction
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Enabling SNMP
Serial Interfaces
Types of Access Lists
Snapshot DDR
Securing Enable Mode Access
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Getting Faster to Get Better Why You Need Both Lean and Six Sigma
Success Story #2 Bank One Bigger… Now Better
Success Story #3 Fort Wayne, Indiana From 0 to 60 in nothing flat
Phase 1 Readiness Assessment
Phase 4 Performance and Control
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies