Figure 13.1: Graphical illustration of the problem facing a conference attendee who is traveling in the United States and wants to connect his or her laptop computer to his or her corporate intranet in Europe.
Figure 13.2: The layer 2 and layer 3 tunneling encapsulation schemes.
Figure 13.3: Graphical illustration of the layer 2 forwarding/tunneling solution for the conference attendee problem.
Figure 13.4: The PPTP encapsulation scheme.
Chapter 14: Internet Layer Security Protocols
Figure 14.1: Encapsulated IP packet.
Figure 14.2: High-level overview of the IP security architecture.
Figure 14.3: IPsec transport and tunnel modes.
Figure 14.4: he authentication header (AH) format.
Figure 14.5: The encapsulating security payload (ESP) format.
Figure 14.6: The use of SKIP to encrypt unicast and multicast IP packets.
Chapter 15: Transport Layer Security Protocols
Figure 15.1: The architecture of SSL and the SSL protocol.
Figure 15.2: The SSL Record Protocol steps.
Figure 15.3: PKCS #1 block format for encryption.
Chapter 16: Application Layer Security Protocols
Figure 16.1: The Kerberos system and the corresponding protocol steps.
Chapter 19: Public Key Infrastructures
Figure 19.1: The structures of PGP and X.509 certificates.
Chapter 21: Risk Management
Figure 21.1: The individual steps in a risk management process.