Virtual private networks (eBook, 1999) []
skip to content
Virtual private networks Preview this item
ClosePreview this item

Virtual private networks

Author: Charlie Scott; Paul Wolfe; Mike Erwin
Publisher: Beijing [China] ; Sebastopol, CA : O'Reilly, ©1999.
Edition/Format:   eBook : Document : English : 2nd edView all editions and formats

A guide to setting up systems that can utilize the Internet to access and send information from one network to another, yet remain secure from unauthorized viewers. Four specific solutions are  Read more...


(not yet rated) 0 with reviews - Be the first.

More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Genre/Form: Electronic books
Electronic book
Additional Physical Format: Print version:
Scott, Charlie.
Virtual private networks.
Beijing [China] ; Sebastopol, CA : O'Reilly, ©1999
(DLC) 00265434
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Charlie Scott; Paul Wolfe; Mike Erwin
ISBN: 9781565925298 1565925297
OCLC Number: 54116280
Reproduction Notes: Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL
Description: 1 online resource (xiv, 211 pages) : illustrations
Details: Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Contents: Preface 1. Why Build a Virtual Private Network? What Does a VPN Do? Security Risks of the Internet How VPNs Solve Internet Security Issues VPN Solutions A Note on IP Address and Domain Name Conventions Used in This Book 2. Basic VPN Technologies Firewall Deployment Encryption and Authentication VPN Protocols Methodologies for Compromising VPNs Patents and Legal Ramifications 3. Wide Area, Remote Access, and the VPN General WAN, RAS, and VPN Concepts VPN Versus WAN VPN Versus RAS 4. Implementing Layer 2 Connections Differences Between PPTP, L2F, and L2TP How PPTP Works Features of PPTP 5. Configuring and Testing Layer 2 Connections Installing and Configuring PPTP on a Windows NT RAS Server Configuring PPTP for Dial-up Networking on a Windows NT Client Configuring PPTP for Dial-up Networking on a Windows or 98 Client Enabling PPTP on Remote Access Switches Making the Calls Troubleshooting Problems Using PPTP with Other Security Measures 6. Implementing the AltaVista Tunnel Advantages of the AltaVista Tunnel System AltaVista Tunnel Limitations How the AltaVista Tunnel Works VPNs and AltaVista 7. Configuring and Testing the AltaVista Tunnel Getting Busy Installing the AltaVista Tunnel Configuring the AltaVista Tunnel Extranet and Telecommuter Server Configuring the AltaVista Telecommuter Client Troubleshooting Problems 8. Creating a VPN with the Unix Secure Shell The SSH Software Building and Installing SSH SSH Components Creating a VPN with PPP and SSH Troubleshooting Problems A Performance Evaluation 9. The Cisco PIX Firewall The Cisco PIX Firewall The PIX in Action Configuring the PIX as a Gateway Configuring the Other VPN Capabilities 10. Managing and Maintaining Your VPN Choosing an ISP Solving VPN Problems Delivering Quality of Service Security Suggestions Keeping Yourself Up-to-Date 11. A VPN Scenario The Topology Central Office Large Branch Office Small Branch Offices Remote Access Users A Network Diagram A. Emerging Internet Technologies B. Resources, Online and Otherwise Index
Responsibility: Charlie Scott, Paul Wolfe, and Mike Erwin.


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.