图书介绍
Implementing virtual private networksPDF|Epub|txt|kindle电子书版本下载
![Implementing virtual private networks](https://www.shukui.net/cover/57/31132443.jpg)
- Steven Brown 著
- 出版社: 北京:人民邮电出版社
- ISBN:7115087849
- 出版时间:2000
- 标注页数:595页
- 文件大小:40MB
- 文件页数:617页
- 主题词:
PDF下载
下载说明
Implementing virtual private networksPDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
PART 1 THE FOUNDATIONS OF VPNs1
Chapter 1 Introduction to VPN Technology3
What Is a VPN?4
Components That Make Up a VPN13
Who Supports VPNs?18
The Growth of VPNs18
Identifying a Need for VPN20
The Business Need for VPNs21
How to Choose VPN Services22
Conclusion25
Chapter 2 Network Security for VPNs27
What Is Network Security?28
What Can You Do to Protect Against Threats?30
How to Identify Attacks40
What Are Some Security Requirements of VPNs?42
Why Is Security So Important When Implementing VPNs?46
Implementing a Good Security Policy48
Is Your Organization Vulnerable to Attacks?50
What Are Some Types of Attacks?52
Conclusion53
Chapter 3 The Advantages and Disadvantages of VPN Technology55
VPN Benefits56
Cost Savings of VPNs57
Benefits of Network Design58
End-User Benefits of VPNs62
Benefits of a Global Reach64
Benefits to ISPs65
Competitive Advantage of VPNs66
Cost of VPN Technology67
Additional Telecommunication Costs77
Quality of Service Guarantees79
Service Level Agreements80
Conclusion82
Chapter 4 VPN Architecture85
Introduction to Architecture86
Which Is the Best VPN for You?87
VPN Supplied by Network Service Provider93
Firewall-Based VPNs99
Black-Box-Based VPNs101
Router-Based VPNs102
Remote Access-Based VPNs104
Application-Aware/Proxy Toolkit VPNs105
Multiservice Applications with VPNs106
Software-Based VPNs108
Performance Statistics/Comparisons-109
Tunnel Switches for VPNs109
Certification/Compliance112
Conclusion113
Chapter 5 Topologies of VPNs115
Introduction to VPN Topology116
Firewall/VPN-to-Client Topology118
VPN/LAN-to-LAN Topology120
VPN/Firewall-to-Intranet/Extranet Topology123
VPN/Frame or ATM Topology126
Hardware (Black-Box) VPN Topology128
VPN/NAT Topology131
VPN Switch Topology132
VPN Nested Tunnels134
Load Balancing and Synchronization135
Conclusion139
Chapter 6 Government Restrictions on VPN Technology141
Introduction to the Politics of Encryption142
What Role Does Government play in VPN Technology?144
Why Would the Government s Policy Actions Affect VPN Security?146
Where Do I Get Permission to Use Strong Security?148
The Economic Cost of Government Intrusion149
Legal Status of Encryption151
International Impact on U.S.Government s Encryption Policy152
What s Happening Today?153
Conclusion158
PART 2 THE VPN IMPLEMENTATION161
Chapter 7 The Basics163
Decide on a Game Plan164
VPN Architecture Placement167
Routing Problems168
Topology Placement172
IP/NAT Addressing Concerns176
Remote Access Issues183
DNS/SMTP Issues185
Conclusion186
Chapter 8 Installing a VPN,Part I189
Introduction to Installing a Firewall-Based VPN190
The Firewall-Based VPN Model193
Obtain and Assign IP Address Space197
Implementing a Good Security Policy205
Implementing Management Traffic208
Implementing SMTP and DNS Issues209
Implementing Authentication210
The Drop All Rule213
Implementing the VPN Rule214
Branch Office VPNs215
Remote Users VPNs217
Conclusion218
Chapter 9 Installing a VPN,Part Ⅱ221
Service Provider VPN Services222
Stand-alone VPN Services223
Aventail ExtraNet Center223
Compatible Systems—Access Servers232
Nortel Networks—Extranet Switch 4000237
Radguard—clPro System242
RedCreek—Ravlin247
Timestep—PERMIT Enterprise252
VPNet—VPLink Architecture257
Conclusion263
Chapter 10 Troubleshooting VPNs265
Introduction to Troubleshooting VPNs266
Remote DiaHn Users269
LAN-to-LAN VPN276
PPTP VPN277
LZTP VPN283
IPSec VPN285
Multihoned Firewall/VPN288
Conclusion293
Chapter 11 Maintaining a VPN295
Introduction296
Redundant Links297
Growth in Your Organization299
Software Updates300
Onsite Technical Support302
Telephone Support303
Help Desk Support to Remote Users304
VPNs,Build or Buy?304
Compatibility Issues305
Alerting306
Monitoring306
Logging307
Event Correlation307
Encryption and Encapsulation309
Key Management311
Random-Number Generators311
Certificates312
Security Update312
Support to Major Upgrade314
Tunneling Protocols315
Management Devices315
Performance316
Quality of Service317
Authentication317
Conclusion318
Skilled Labor318
PART 3 THE SECURITY OF VPNs321
Chapter 12 Cryptography323
What is Cryptography?324
Private versus Public Key Cryptography325
Block Ciphers326
Stream Ciphers333
Hash Functions335
Message Authentication Codes336
Digital Timestamps336
Digital Signatures with Certificate Authorities337
Strengths of Cryptographic Hash Functions338
Random-Number Generators339
Clipper Chip340
Which Cryptosystem is Right for You?341
Cryptography Timeline342
Conclusion352
Chapter 13 Encryption353
Private-Key Encryption354
Public-Key Encryption356
Shared Secret Key357
Digital Signatures359
Certificate Authorities (CAs)360
Diffie-Hellman Public-Key Algorithm361
RSA Public-Key Algorithm362
Pretty Good Privacy(PGP)364
Internet Security Protocol(IPSec)365
Encapsulating Security Payload(ESP)RFC-2406368
Public Key Infrastructure(PKI)372
Layer Z Forwarding Protocol(LZF)373
Point-to-Point Tunneling Protocol(PPTP)374
Layer Z Tunneling Protocol(LZTP)377
Simple Key Internet Protocol(SKIP)378
Secure Wide Area Network(S/WAN)379
Conclusion380
Chapter 14 Secure Communication and Authentication381
Authentication Protocols382
Operating System Passwords384
S/KEY385
Remote Authentication DiaHn Service(RADIUS)388
Terminal Access Controller Access Control System(TACACS/XTACACS)390
Terminal Access Controller Access Control System Plus(TACACS+)391
Kerberos392
Certificates395
Smart Cards399
Hardware Tokens/PKCS#11400
Lightweight Directory Access Protocol(LDAP)402
ACE/Server with SecurlD403
Biometrics405
Secure Modems406
Conclusion407
Chapter 15 VPN Operating System Vulnerabilities409
What Are VPN Operating System Vulnerabilities?410
UNIX Guidelines411
UNIX Operating System Vulnerabilities415
Windows 95 Guidelines421
Windows 95 Vulnerabilities422
Windows NT Guidelines423
Windows NT Vulnerabilities426
Novell Guidelines Conclusion429
Chapter 16 VPN Security Attacks431
Introduction to VPN Attacks432
Cryptographic Algorithms Attacks433
Random-Number Generator(RNG)Attacks438
Government Attacksvia Key Recovery439
Internet Security(IPSec)Attacks440
Point-To-Point Tunneling Protocol(PPTP)Attacks445
SKIP Attacks449
Certificate Authorities Attacks449
RADIUS Attacks452
Kerberos Attacks453
Pretty Good Privacy(PGP)Attacks454
Denial of Service(DoS)Attacks456
Other Attacks461
Conclusion462
Chapter 17 Security Toolbelt465
What Is a Security Toolbelt?466
The Need for a Security Toolbelt470
RFC 2196 Site Security Handbook473
Security Escalation Procedures476
Building a Secure Site477
Security Tools480
Incident Response Centers485
Mailing Lists/Newsgroups487
Web Security488
Conclusion493
Chapter 18 Intrusion Detection and Security Scanning495
Introduction to Intrusion Detection496
Categories of Intrusion Systems499
Characteristics of a Good Intrusion Detection System502
Intrusion Detection/Footprint503
Fooling an Intrusion Detection System508
Intrusion Detection Tools511
Limiting Intrusion515
Scanners517
Conclusion520
Chapter 19 Emerging Technologies for VPNs523
Introduction to Emerging Technologies524
Advances in Computing525
Advances in Cryptographic Systems529
Private Doorbell533
Steganography535
What Are the New Threats?538
Government Regulations540
Wireless VPNs543
Conclusion544
Appendix A Links and References547
Glossary563
Index581