Flylib.com
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Mark Lewis
BUY ON AMAZON
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
What Is a Virtual Private Network?
VPN Devices
Deploying Site-to-Site and Remote Access VPNs: A Comparison
Summary
Review Questions
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Benefits and Drawbacks of L2TPv3-Based L2VPNs
L2TPv3 Pseudowire Operation
Configuring and Verifying L2TPv3 Pseudowires
Summary
Review Questions
Designing and Implementing AToM-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Benefits and Drawbacks of AToM-Based L2VPNs
AToM Pseudowire Operation
Deploying AToM Pseudowires
Implementing Advanced AToM Features
Summary
Review Questions
Designing MPLS Layer 3 Site-to-Site VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advantages and Disadvantages of MPLS Layer 3 VPNs
MPLS Layer 3 VPNs Overview
A Detailed Examination of MPLS Layer 3 VPNs
Deploying MPLS Layer 3 VPNs
Summary
Review Questions
Advanced MPLS Layer 3 VPN Deployment Considerations
Advanced MPLS Layer 3 VPN Deployment Considerations
The Carriers Carrier Architecture
The Inter-Autonomous System/Interprovider MPLS VPN Architecture
Supporting Multicast Transport in MPLS Layer 3 VPNs
Implementing QoS for MPLS Layer 3 VPNs
Supporting IPv6 Traffic Transport in MPLS Layer 3 VPNs Using 6VPE
Summary
Review Questions
Deploying Site-to-Site IPsec VPNs
Deploying Site-to-Site IPsec VPNs
Advantages and Disadvantages of IPsec Site-to-Site VPNs
IPsec: A Security Architecture for IP
Deploying IPsec VPNs: Fundamental Considerations
Summary
Review Questions
Scaling and Optimizing IPsec VPNs
Scaling and Optimizing IPsec VPNs
Scaling IPsec Virtual Private Networks
Ensuring High Availability in an IPsec VPN
Designing QoS for IPsec VPNs
MTU and Fragmentation Considerations in an IPsec VPN
Summary
Review Questions
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Benefits and Drawbacks of L2TP Remote Access VPNs
Operation of L2TP Voluntary/Client-Initiated Tunnel Mode
Implementing L2TP Voluntary/Client-Initiated Tunnel Mode Remote Access VPNs
Designing and Implementing L2TP Compulsory/NAS-Initiated Tunnel Mode Remote Access VPNs
Integrating L2TP Remote Access VPNs with MPLS VPNs
Summary
Review Questions
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Comparing IPsec Remote Access VPNs with Other Types of Remote Access VPNs
Understanding IKE in an IPsec Remote Access VPN Environment
Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication
Summary
Review Questions
Designing and Building SSL Remote Access VPNs (WebVPN)
Designing and Building SSL Remote Access VPNs (WebVPN)
Comparing SSL VPNs to Other Types of Remote Access VPNs
Understanding the Operation of SSL Remote Access VPNs
Using Clientless SSL Remote Access VPNs (WebVPN) on the Cisco VPN 3000 Concentrator
Implementing Full Network Access Using the Cisco SSL VPN Client
Strengthening SSL Remote Access VPNs Security by Implementing Cisco Secure Desktop
Enabling SSL VPNs (WebVPN) on Cisco IOS Devices
Deploying SSL VPNs (WebVPN) on the ASA 5500
Summary
Review Questions
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix A. VPLS and IPLS Layer 2 VPNs
Understanding VPLS
Understanding IPLS
Summary: Comparing VPLS and IPLS
Appendix B. Answers to Review Questions
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Mark Lewis
BUY ON AMAZON
Java I/O
Streams in Memory
Sequence Input Streams
Decimal Formats
Files
Discovering Devices
VBScript Programmers Reference
Data Types
Error Handling and Debugging
Super-Charged Client-Side Scripting
Appendix I VBScript Features not in VBA
Appendix L ActiveX Data Objects
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
IDS and IPS Internals
Data Correlation
Policy and Procedures
Laws, Standards, and Organizations
The Future of Intrusion Detection and Prevention
802.11 Wireless Networks: The Definitive Guide, Second Edition
Contention-Based Data Service
Robust Security Network (RSN) Operations
Gaussian Frequency Shift Keying (GFSK)
Differential Phase Shift Keying (DPSK)
Cisco 1200 Access Point
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
The SQL Buffer
Grouping and Summarizing
Commenting Your Scripts
An Excel-Specific HTML Hack
Windows GUI SQL*Plus
FileMaker 8 Functions and Scripts Desk Reference
Design Functions
Get(RecordNumber)
Get(ScriptName)
Get(WindowVisible)
Menu Reference
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies