图书介绍

Implementing virtual private networksPDF|Epub|txt|kindle电子书版本下载

Implementing virtual private networks
  • Steven Brown 著
  • 出版社: 北京:人民邮电出版社
  • ISBN:7115087849
  • 出版时间:2000
  • 标注页数:595页
  • 文件大小:40MB
  • 文件页数:617页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

Implementing virtual private networksPDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

PART 1 THE FOUNDATIONS OF VPNs1

Chapter 1 Introduction to VPN Technology3

What Is a VPN?4

Components That Make Up a VPN13

Who Supports VPNs?18

The Growth of VPNs18

Identifying a Need for VPN20

The Business Need for VPNs21

How to Choose VPN Services22

Conclusion25

Chapter 2 Network Security for VPNs27

What Is Network Security?28

What Can You Do to Protect Against Threats?30

How to Identify Attacks40

What Are Some Security Requirements of VPNs?42

Why Is Security So Important When Implementing VPNs?46

Implementing a Good Security Policy48

Is Your Organization Vulnerable to Attacks?50

What Are Some Types of Attacks?52

Conclusion53

Chapter 3 The Advantages and Disadvantages of VPN Technology55

VPN Benefits56

Cost Savings of VPNs57

Benefits of Network Design58

End-User Benefits of VPNs62

Benefits of a Global Reach64

Benefits to ISPs65

Competitive Advantage of VPNs66

Cost of VPN Technology67

Additional Telecommunication Costs77

Quality of Service Guarantees79

Service Level Agreements80

Conclusion82

Chapter 4 VPN Architecture85

Introduction to Architecture86

Which Is the Best VPN for You?87

VPN Supplied by Network Service Provider93

Firewall-Based VPNs99

Black-Box-Based VPNs101

Router-Based VPNs102

Remote Access-Based VPNs104

Application-Aware/Proxy Toolkit VPNs105

Multiservice Applications with VPNs106

Software-Based VPNs108

Performance Statistics/Comparisons-109

Tunnel Switches for VPNs109

Certification/Compliance112

Conclusion113

Chapter 5 Topologies of VPNs115

Introduction to VPN Topology116

Firewall/VPN-to-Client Topology118

VPN/LAN-to-LAN Topology120

VPN/Firewall-to-Intranet/Extranet Topology123

VPN/Frame or ATM Topology126

Hardware (Black-Box) VPN Topology128

VPN/NAT Topology131

VPN Switch Topology132

VPN Nested Tunnels134

Load Balancing and Synchronization135

Conclusion139

Chapter 6 Government Restrictions on VPN Technology141

Introduction to the Politics of Encryption142

What Role Does Government play in VPN Technology?144

Why Would the Government s Policy Actions Affect VPN Security?146

Where Do I Get Permission to Use Strong Security?148

The Economic Cost of Government Intrusion149

Legal Status of Encryption151

International Impact on U.S.Government s Encryption Policy152

What s Happening Today?153

Conclusion158

PART 2 THE VPN IMPLEMENTATION161

Chapter 7 The Basics163

Decide on a Game Plan164

VPN Architecture Placement167

Routing Problems168

Topology Placement172

IP/NAT Addressing Concerns176

Remote Access Issues183

DNS/SMTP Issues185

Conclusion186

Chapter 8 Installing a VPN,Part I189

Introduction to Installing a Firewall-Based VPN190

The Firewall-Based VPN Model193

Obtain and Assign IP Address Space197

Implementing a Good Security Policy205

Implementing Management Traffic208

Implementing SMTP and DNS Issues209

Implementing Authentication210

The Drop All Rule213

Implementing the VPN Rule214

Branch Office VPNs215

Remote Users VPNs217

Conclusion218

Chapter 9 Installing a VPN,Part Ⅱ221

Service Provider VPN Services222

Stand-alone VPN Services223

Aventail ExtraNet Center223

Compatible Systems—Access Servers232

Nortel Networks—Extranet Switch 4000237

Radguard—clPro System242

RedCreek—Ravlin247

Timestep—PERMIT Enterprise252

VPNet—VPLink Architecture257

Conclusion263

Chapter 10 Troubleshooting VPNs265

Introduction to Troubleshooting VPNs266

Remote DiaHn Users269

LAN-to-LAN VPN276

PPTP VPN277

LZTP VPN283

IPSec VPN285

Multihoned Firewall/VPN288

Conclusion293

Chapter 11 Maintaining a VPN295

Introduction296

Redundant Links297

Growth in Your Organization299

Software Updates300

Onsite Technical Support302

Telephone Support303

Help Desk Support to Remote Users304

VPNs,Build or Buy?304

Compatibility Issues305

Alerting306

Monitoring306

Logging307

Event Correlation307

Encryption and Encapsulation309

Key Management311

Random-Number Generators311

Certificates312

Security Update312

Support to Major Upgrade314

Tunneling Protocols315

Management Devices315

Performance316

Quality of Service317

Authentication317

Conclusion318

Skilled Labor318

PART 3 THE SECURITY OF VPNs321

Chapter 12 Cryptography323

What is Cryptography?324

Private versus Public Key Cryptography325

Block Ciphers326

Stream Ciphers333

Hash Functions335

Message Authentication Codes336

Digital Timestamps336

Digital Signatures with Certificate Authorities337

Strengths of Cryptographic Hash Functions338

Random-Number Generators339

Clipper Chip340

Which Cryptosystem is Right for You?341

Cryptography Timeline342

Conclusion352

Chapter 13 Encryption353

Private-Key Encryption354

Public-Key Encryption356

Shared Secret Key357

Digital Signatures359

Certificate Authorities (CAs)360

Diffie-Hellman Public-Key Algorithm361

RSA Public-Key Algorithm362

Pretty Good Privacy(PGP)364

Internet Security Protocol(IPSec)365

Encapsulating Security Payload(ESP)RFC-2406368

Public Key Infrastructure(PKI)372

Layer Z Forwarding Protocol(LZF)373

Point-to-Point Tunneling Protocol(PPTP)374

Layer Z Tunneling Protocol(LZTP)377

Simple Key Internet Protocol(SKIP)378

Secure Wide Area Network(S/WAN)379

Conclusion380

Chapter 14 Secure Communication and Authentication381

Authentication Protocols382

Operating System Passwords384

S/KEY385

Remote Authentication DiaHn Service(RADIUS)388

Terminal Access Controller Access Control System(TACACS/XTACACS)390

Terminal Access Controller Access Control System Plus(TACACS+)391

Kerberos392

Certificates395

Smart Cards399

Hardware Tokens/PKCS#11400

Lightweight Directory Access Protocol(LDAP)402

ACE/Server with SecurlD403

Biometrics405

Secure Modems406

Conclusion407

Chapter 15 VPN Operating System Vulnerabilities409

What Are VPN Operating System Vulnerabilities?410

UNIX Guidelines411

UNIX Operating System Vulnerabilities415

Windows 95 Guidelines421

Windows 95 Vulnerabilities422

Windows NT Guidelines423

Windows NT Vulnerabilities426

Novell Guidelines Conclusion429

Chapter 16 VPN Security Attacks431

Introduction to VPN Attacks432

Cryptographic Algorithms Attacks433

Random-Number Generator(RNG)Attacks438

Government Attacksvia Key Recovery439

Internet Security(IPSec)Attacks440

Point-To-Point Tunneling Protocol(PPTP)Attacks445

SKIP Attacks449

Certificate Authorities Attacks449

RADIUS Attacks452

Kerberos Attacks453

Pretty Good Privacy(PGP)Attacks454

Denial of Service(DoS)Attacks456

Other Attacks461

Conclusion462

Chapter 17 Security Toolbelt465

What Is a Security Toolbelt?466

The Need for a Security Toolbelt470

RFC 2196 Site Security Handbook473

Security Escalation Procedures476

Building a Secure Site477

Security Tools480

Incident Response Centers485

Mailing Lists/Newsgroups487

Web Security488

Conclusion493

Chapter 18 Intrusion Detection and Security Scanning495

Introduction to Intrusion Detection496

Categories of Intrusion Systems499

Characteristics of a Good Intrusion Detection System502

Intrusion Detection/Footprint503

Fooling an Intrusion Detection System508

Intrusion Detection Tools511

Limiting Intrusion515

Scanners517

Conclusion520

Chapter 19 Emerging Technologies for VPNs523

Introduction to Emerging Technologies524

Advances in Computing525

Advances in Cryptographic Systems529

Private Doorbell533

Steganography535

What Are the New Threats?538

Government Regulations540

Wireless VPNs543

Conclusion544

Appendix A Links and References547

Glossary563

Index581

热门推荐