1st Edition

A Technical Guide to IPSec Virtual Private Networks





ISBN 9780849308765
Published December 11, 2000 by Auerbach Publications
376 Pages

USD $125.00

Prices & shipping based on shipping country


Preview

Book Description

What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become.
A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security.
Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies.
After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.

Table of Contents

Introduction
Know the Terrain
The Internet
TCP/IP Quickie
Information Age
Security Concepts
Cryptography
The Other Guys
Why are "VPNs" So HOT?
IP Security Primer
History
Structure
Applications
Quality of Service
Policy
Encryption
Symmetrical Encryption
Asymmetrical Encryption
Message Authentication Code
Perfect Forward Secrecy
Diffie-Hellman
IPSEC Architecture
Domain of Interpretation
Security Associations
Transport Mode
Tunnel Mode
Authentication
Shared Secret
Certificates
Public Key Cryptography
Non-IPSec Authentication
Security Protocols
Encapsulating Security Payload
Authentication Header
Key Management
The Roll of Key Management
Creating IKE for IPSec
Phase One
Phase Two
Implementation Considerations
Network to Network
Client to Network
Client Interaction
Rollout Concepts
Product Evaluation
Business Drivers
Grading Methodology
Lab Testing
Pilot Processes
Trend Analysis

...
View More