Virtual Private Networks: Technologies and Solutions (Addison-Wesley Professional Computing Series)

Virtual Private Networks: Technologies and Solutions (Addison-Wesley Professional Computing Series)

by RuixiYuan (Author), W.TimothyStrayer (Author)

Synopsis

VPNs enable any enterprise to utilize the Internet as its own secure private network. In this book, two leading VPN implementers offer a start-to-finish, hands-on guide to constructing and operating secure VPNs. Going far beyond the theory found in most books, Ruixi Yuan and Tim Strayer present best practices for every aspect of VPN deployment, including tunneling, IPsec, authentication, public key infrastructure, and network/service management. Strayer and Yuan begin with a detailed overview of the fundamental concepts and architectures associated with enterprise VPNs, including site-to-site VPNs, remote access VPNs, and extranets. They compare all options for establishing VPN tunnels across the Internet, including PPTP, L2F, and L2TP. Next, they present in-depth coverage of implementing IPsec; establishing two-party or trusted third-party authentication; building a robust public key infrastructure; and managing access control. The book includes expert coverage of VPN gateway configuration, provisioning, and management; Windows and other VPN clients; and network/service management, including SLAs and network operations centers. Finally, the authors preview the future of VPNs, showing how they may be enhanced to provide greater quality of service and network intelligence. For all networking and IT professionals, security specialists, consultants, vendors, and service providers responsible for building or operating VPNs.

$5.87

Save:$38.57 (87%)

Quantity

1 in stock

More Information

Format: Paperback
Pages: 336
Edition: 1
Publisher: Addison Wesley
Published: 24 Apr 2001

ISBN 10: 0201702096
ISBN 13: 9780201702095
Book Overview:

VPNs enable any enterprise to utilize the Internet as its own secure private network. In this book, two leading VPN implementers offer a start-to-finish, hands-on guide to constructing and operating secure VPNs. Going far beyond the theory found in most books, Ruixi Yuan and Tim Strayer present best practices for every aspect of VPN deployment, including tunneling, IPsec, authentication, public key infrastructure, and network/service management. Strayer and Yuan begin with a detailed overview of the fundamental concepts and architectures associated with enterprise VPNs, including site-to-site VPNs, remote access VPNs, and extranets. They compare all options for establishing VPN tunnels across the Internet, including PPTP, L2F, and L2TP. Next, they present in-depth coverage of implementing IPsec; establishing two-party or trusted third-party authentication; building a robust public key infrastructure; and managing access control. The book includes expert coverage of VPN gateway configuration, provisioning, and management; Windows and other VPN clients; and network/service management, including SLAs and network operations centers. Finally, the authors preview the future of VPNs, showing how they may be enhanced to provide greater quality of service and network intelligence. For all networking and IT professionals, security specialists, consultants, vendors, and service providers responsible for building or operating VPNs.


Author Bio

Ruixi Yuan is a network researcher focusing on high-speed networking and security. He was the architect of Genuity's VPN Advantage Service and served as its product manager. In addition, he has conducted research and development in computer and communication networks at NEC, GTE Laboratories, and BBN Technologies. W. Timothy Strayer is a senior scientist at BBN Technologies where he conducts research on network protocols, routing infrastructures, computer security, and network management and monitoring systems for VPNs. Prior to BBN, he was a senior network researcher at Sandia National Laboratories. He co-authored the book, XTP: The Xpress Transfer Protocol (Addison-Wesley, 1992).

0201702096AB04062001