IPSEC VPN DESIGN

IPSEC VPN DESIGN

IPSEC VPN DESIGN

BOLLAPRAGADA, VIJAY

60,31 €
IVA incluido
🚫 No disponible
Editorial:
***VARIAS***
Materia
Informática en inglés
Ubicación
A1-3112
ISBN:
978-1-58705-111-1
60,31 €
IVA incluido
🚫 No disponible
Añadir a favoritos

The definitive design and deployment guide for secure virtual private networks Learn about IPSec protocols and Cisco IOS IPSec packet processing Understand the differences between IPSec tunnel mode and transport mode Evaluate the IPSec features that improve VPN scalability and fault tolerance, such as dead peer detection and control plane keepalives Overcome the challenges of working with NAT and PMTUD Explore IPSec remoteaccess features, including extended authentication, modeconfiguration, and digital certificates Examine the pros and cons of various IPSec connection models such as native IPSec, GRE, and remote access Apply fault tolerance methods to IPSec VPN designs Employ mechanisms to alleviate the configuration complexity of a large scale IPSec VPN, including Tunnel EndPoint Discovery (TED) and Dynamic Multipoint VPNs (DMVPN) Add services to IPSec VPNs, including voice and multicast Understand how networkbased VPNs operate and how to integrate IPSec VPNs with MPLS VPNs Among the many functions that networking technologies permit is the ability for organizations to easily and securely communicate with branch offices, mobile users, telecommuters, and business partners. Such connectivity is now vital to maintaining a competitive level of business productivity. Although several technologies exist that can enable interconnectivity among business sites, Internetbased virtual private networks (VPNs) have evolved as the most effective means to link corporate network resources to remote employees, offices, and mobile workers. VPNs provide productivity enhancements, efficient and convenient remote access to network resources, sitetosite connectivity, a high level of security, and tremendous cost savings. IPSec VPN Design is the first book to present a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. Divided into three parts, the book provides a solid understanding of design and architectural issues of largescale, secure VPN solutions. Part I includes a comprehensive introduction to the general architecture of IPSec, including its protocols and Cisco IOS® IPSec implementation details. Part II examines IPSec VPN design principles covering hubandspoke, fullmesh, and faulttolerant designs. This part of the book also covers dynamic configuration models used to simplify IPSec VPN designs. Part III addresses design issues in adding services to an IPSec VPN such as voice and multicast. This part of the book also shows you how to effectively integrate IPSec VPNs with MPLS VPNs. IPSec VPN Design provides you with the fieldtested design and configuration advice to help you deploy an effective and secure VPN solution in any environment. This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build endtoend selfdefending networks.

Artículos relacionados

  • IOS 10 PROGRAMMING FUNDAMENTALS WITH SWIFT
    MATT NEUBURG
    ❌ Agotado

    57,30 €

  • QUANTUM COMPUTING FOR COMPUTER SCIENTISTS
    YANOFSKY, NOSON S
    🚫 No disponible

    107,55 €

  • BIG DATA
    MAYER-SCHÖNBERGER, VIKTOR
    A New York Times bestseller. Longlisted for the Financial Times/Goldman Sachs Business Book of the Year Award. Since Aristotle, we have fought to understand the causes behind everything. But this ideology is fading. In the age of big data, we can crunch an incomprehensible amount of information, providing us with invaluable insights about the what rather than the why. We're jus...
    🚫 No disponible

    23,00 €

  • THE CORE IOS DEVELOPER'S COOKBOOK
    SADUN, ERICA / WARDWELL, RICH
    ❌ Agotado

    48,75 €

  • DRIVEN BY DATA SCIENCE
    FOREMAN, JOHN
    🚫 No disponible

    55,00 €

  • FLIE SYSTEM FORENSIC ANALYSIS
    CARRIER, BRIAN
    Most digital evidence is stored within the computer`s file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file syst...
    🚫 No disponible

    54,28 €