Flylib.com
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Mark Lewis
BUY ON AMAZON
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
What Is a Virtual Private Network?
VPN Devices
Deploying Site-to-Site and Remote Access VPNs: A Comparison
Summary
Review Questions
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Benefits and Drawbacks of L2TPv3-Based L2VPNs
L2TPv3 Pseudowire Operation
Configuring and Verifying L2TPv3 Pseudowires
Summary
Review Questions
Designing and Implementing AToM-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Benefits and Drawbacks of AToM-Based L2VPNs
AToM Pseudowire Operation
Deploying AToM Pseudowires
Implementing Advanced AToM Features
Summary
Review Questions
Designing MPLS Layer 3 Site-to-Site VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advantages and Disadvantages of MPLS Layer 3 VPNs
MPLS Layer 3 VPNs Overview
A Detailed Examination of MPLS Layer 3 VPNs
Deploying MPLS Layer 3 VPNs
Summary
Review Questions
Advanced MPLS Layer 3 VPN Deployment Considerations
Advanced MPLS Layer 3 VPN Deployment Considerations
The Carriers Carrier Architecture
The Inter-Autonomous System/Interprovider MPLS VPN Architecture
Supporting Multicast Transport in MPLS Layer 3 VPNs
Implementing QoS for MPLS Layer 3 VPNs
Supporting IPv6 Traffic Transport in MPLS Layer 3 VPNs Using 6VPE
Summary
Review Questions
Deploying Site-to-Site IPsec VPNs
Deploying Site-to-Site IPsec VPNs
Advantages and Disadvantages of IPsec Site-to-Site VPNs
IPsec: A Security Architecture for IP
Deploying IPsec VPNs: Fundamental Considerations
Summary
Review Questions
Scaling and Optimizing IPsec VPNs
Scaling and Optimizing IPsec VPNs
Scaling IPsec Virtual Private Networks
Ensuring High Availability in an IPsec VPN
Designing QoS for IPsec VPNs
MTU and Fragmentation Considerations in an IPsec VPN
Summary
Review Questions
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Benefits and Drawbacks of L2TP Remote Access VPNs
Operation of L2TP Voluntary/Client-Initiated Tunnel Mode
Implementing L2TP Voluntary/Client-Initiated Tunnel Mode Remote Access VPNs
Designing and Implementing L2TP Compulsory/NAS-Initiated Tunnel Mode Remote Access VPNs
Integrating L2TP Remote Access VPNs with MPLS VPNs
Summary
Review Questions
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Comparing IPsec Remote Access VPNs with Other Types of Remote Access VPNs
Understanding IKE in an IPsec Remote Access VPN Environment
Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication
Summary
Review Questions
Designing and Building SSL Remote Access VPNs (WebVPN)
Designing and Building SSL Remote Access VPNs (WebVPN)
Comparing SSL VPNs to Other Types of Remote Access VPNs
Understanding the Operation of SSL Remote Access VPNs
Using Clientless SSL Remote Access VPNs (WebVPN) on the Cisco VPN 3000 Concentrator
Implementing Full Network Access Using the Cisco SSL VPN Client
Strengthening SSL Remote Access VPNs Security by Implementing Cisco Secure Desktop
Enabling SSL VPNs (WebVPN) on Cisco IOS Devices
Deploying SSL VPNs (WebVPN) on the ASA 5500
Summary
Review Questions
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix A. VPLS and IPLS Layer 2 VPNs
Understanding VPLS
Understanding IPLS
Summary: Comparing VPLS and IPLS
Appendix B. Answers to Review Questions
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Mark Lewis
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Compiling the Needed Documentation
Level II Assessments
Tools Used for Assessments and Evaluations
Information Request Form
Appendix D. Dealing with Consultants and Outside Vendors
Visual C# 2005 How to Program (2nd Edition)
Personal Computing, Distributed Computing and Client/Server Computing
Compound Assignment Operators
Case Study: Card Shuffling and Dealing Simulation
Wrap-Up
Self-Review Exercises
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
When Companies Start Using Lean Six Sigma
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Six Things Managers Must Do: How to Support Lean Six Sigma
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Why Office Programming?
Code Behind a Document
Working with Document Properties
An End-to-End Scenario
VSTO Support for Excel Schema Mapping
.NET-A Complete Development Cycle
References for Further Reading
The Initial Use Case Model
Unit Tests
Conclusion
Project Management Issues
Programming .Net Windows Applications
Label
List Controls
Creating a User Control
Binding Data
Assert Yourself
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies