Flylib.com
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Mark Lewis
BUY ON AMAZON
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
What Is a Virtual Private Network?
VPN Devices
Deploying Site-to-Site and Remote Access VPNs: A Comparison
Summary
Review Questions
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Benefits and Drawbacks of L2TPv3-Based L2VPNs
L2TPv3 Pseudowire Operation
Configuring and Verifying L2TPv3 Pseudowires
Summary
Review Questions
Designing and Implementing AToM-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Benefits and Drawbacks of AToM-Based L2VPNs
AToM Pseudowire Operation
Deploying AToM Pseudowires
Implementing Advanced AToM Features
Summary
Review Questions
Designing MPLS Layer 3 Site-to-Site VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advantages and Disadvantages of MPLS Layer 3 VPNs
MPLS Layer 3 VPNs Overview
A Detailed Examination of MPLS Layer 3 VPNs
Deploying MPLS Layer 3 VPNs
Summary
Review Questions
Advanced MPLS Layer 3 VPN Deployment Considerations
Advanced MPLS Layer 3 VPN Deployment Considerations
The Carriers Carrier Architecture
The Inter-Autonomous System/Interprovider MPLS VPN Architecture
Supporting Multicast Transport in MPLS Layer 3 VPNs
Implementing QoS for MPLS Layer 3 VPNs
Supporting IPv6 Traffic Transport in MPLS Layer 3 VPNs Using 6VPE
Summary
Review Questions
Deploying Site-to-Site IPsec VPNs
Deploying Site-to-Site IPsec VPNs
Advantages and Disadvantages of IPsec Site-to-Site VPNs
IPsec: A Security Architecture for IP
Deploying IPsec VPNs: Fundamental Considerations
Summary
Review Questions
Scaling and Optimizing IPsec VPNs
Scaling and Optimizing IPsec VPNs
Scaling IPsec Virtual Private Networks
Ensuring High Availability in an IPsec VPN
Designing QoS for IPsec VPNs
MTU and Fragmentation Considerations in an IPsec VPN
Summary
Review Questions
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Benefits and Drawbacks of L2TP Remote Access VPNs
Operation of L2TP Voluntary/Client-Initiated Tunnel Mode
Implementing L2TP Voluntary/Client-Initiated Tunnel Mode Remote Access VPNs
Designing and Implementing L2TP Compulsory/NAS-Initiated Tunnel Mode Remote Access VPNs
Integrating L2TP Remote Access VPNs with MPLS VPNs
Summary
Review Questions
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Comparing IPsec Remote Access VPNs with Other Types of Remote Access VPNs
Understanding IKE in an IPsec Remote Access VPN Environment
Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication
Summary
Review Questions
Designing and Building SSL Remote Access VPNs (WebVPN)
Designing and Building SSL Remote Access VPNs (WebVPN)
Comparing SSL VPNs to Other Types of Remote Access VPNs
Understanding the Operation of SSL Remote Access VPNs
Using Clientless SSL Remote Access VPNs (WebVPN) on the Cisco VPN 3000 Concentrator
Implementing Full Network Access Using the Cisco SSL VPN Client
Strengthening SSL Remote Access VPNs Security by Implementing Cisco Secure Desktop
Enabling SSL VPNs (WebVPN) on Cisco IOS Devices
Deploying SSL VPNs (WebVPN) on the ASA 5500
Summary
Review Questions
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix A. VPLS and IPLS Layer 2 VPNs
Understanding VPLS
Understanding IPLS
Summary: Comparing VPLS and IPLS
Appendix B. Answers to Review Questions
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Mark Lewis
BUY ON AMAZON
Similar book on Amazon
Cultural Imperative: Global Trends in the 21st Century
End-to-End QoS Network Design: Quality of Service in LANs, WANs, and VPNs
IPSec VPN Design
Optimal Routing Design (paperback) (Networking Technology)
Deploying IPv6 Networks
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Introduction
Generating a Physical Database Schema
Editing Logical Models”Intermediate Aspects
Editing Logical Models”Advanced Aspects
Logical Database Model Reports
FileMaker Pro 8: The Missing Manual
Views
Replacing Data Using a Calculation
Branching and Looping in Scripts
FileMaker Server
A.1. Getting Help from FileMaker Itself
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
The Routers Configuration
Cable
OSPF
Traffic Shaping
Sample Legacy DDR Configurations
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Local Area Network (LAN) Technologies
Internet Group Management Protocol (IGMP)
User Datagram Protocol
Domain Name System (DNS)
Windows Internet Name Service (WINS)
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Answers and Explanations
Answers and Explanations
Answers and Explanations
Exam Prep Questions
Sap Bw: a Step By Step Guide for Bw 2.0
Creating an InfoSource for Characteristic Data
Summary
Creating a Query Using BEx Analyzer
Multi-Cubes
Performance Tuning
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies