skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Virtual private networks Preview this item
ClosePreview this item
Checking...

Virtual private networks

Author: Charlie Scott; Paul Wolfe; Mike Erwin
Publisher: Beijing [China] ; Sebastopol, CA : O'Reilly, ©1999.
Edition/Format:   eBook : Document : English : 2nd edView all editions and formats
Summary:

A guide to setting up systems that can utilize the Internet to access and send information from one network to another, yet remain secure from unauthorized viewers. Four specific solutions are  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Electronic book
Additional Physical Format: Print version:
Scott, Charlie.
Virtual private networks.
Beijing [China] ; Sebastopol, CA : O'Reilly, ©1999
(DLC) 00265434
(OCoLC)40800359
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Charlie Scott; Paul Wolfe; Mike Erwin
ISBN: 9781565925298 1565925297
OCLC Number: 54116280
Reproduction Notes: Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL
Description: 1 online resource (xiv, 211 pages) : illustrations
Details: Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Contents: Preface 1. Why Build a Virtual Private Network? What Does a VPN Do? Security Risks of the Internet How VPNs Solve Internet Security Issues VPN Solutions A Note on IP Address and Domain Name Conventions Used in This Book 2. Basic VPN Technologies Firewall Deployment Encryption and Authentication VPN Protocols Methodologies for Compromising VPNs Patents and Legal Ramifications 3. Wide Area, Remote Access, and the VPN General WAN, RAS, and VPN Concepts VPN Versus WAN VPN Versus RAS 4. Implementing Layer 2 Connections Differences Between PPTP, L2F, and L2TP How PPTP Works Features of PPTP 5. Configuring and Testing Layer 2 Connections Installing and Configuring PPTP on a Windows NT RAS Server Configuring PPTP for Dial-up Networking on a Windows NT Client Configuring PPTP for Dial-up Networking on a Windows or 98 Client Enabling PPTP on Remote Access Switches Making the Calls Troubleshooting Problems Using PPTP with Other Security Measures 6. Implementing the AltaVista Tunnel Advantages of the AltaVista Tunnel System AltaVista Tunnel Limitations How the AltaVista Tunnel Works VPNs and AltaVista 7. Configuring and Testing the AltaVista Tunnel Getting Busy Installing the AltaVista Tunnel Configuring the AltaVista Tunnel Extranet and Telecommuter Server Configuring the AltaVista Telecommuter Client Troubleshooting Problems 8. Creating a VPN with the Unix Secure Shell The SSH Software Building and Installing SSH SSH Components Creating a VPN with PPP and SSH Troubleshooting Problems A Performance Evaluation 9. The Cisco PIX Firewall The Cisco PIX Firewall The PIX in Action Configuring the PIX as a Gateway Configuring the Other VPN Capabilities 10. Managing and Maintaining Your VPN Choosing an ISP Solving VPN Problems Delivering Quality of Service Security Suggestions Keeping Yourself Up-to-Date 11. A VPN Scenario The Topology Central Office Large Branch Office Small Branch Offices Remote Access Users A Network Diagram A. Emerging Internet Technologies B. Resources, Online and Otherwise Index
Responsibility: Charlie Scott, Paul Wolfe, and Mike Erwin.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/54116280<\/a>> # Virtual private networks<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a>, schema:MediaObject<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"54116280<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/cc<\/a>> ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/12567966#Place\/sebastopol_ca<\/a>> ; # Sebastopol, CA<\/span>\n\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/12567966#Place\/beijing_china<\/a>> ; # Beijing China<\/span>\n\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Warning: This malformed URI has been treated as a string - \'https:\/\/www.safaribooksonline.com\/library\/view\/title\/1565925297\/?ar?orpq&email=^u\'<\/span>\" ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh94001277<\/a>> ; # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/004.6\/e21\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/12567966#Topic\/computernetwerken<\/a>> ; # Computernetwerken<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.loc.gov\/authorities\/subjects\/sh95010396<\/a>> ; # Business enterprises--Computer networks<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/919023<\/a>> ; # Extranets (Computer networks)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/977184<\/a>> ; # Internet<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/12567966#Topic\/databescherming<\/a>> ; # Databescherming<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/1146098<\/a>> ; # Telecommuting<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/872341<\/a>> ; # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/842531<\/a>> ; # Business enterprises--Computer networks<\/span>\n\u00A0\u00A0\u00A0\nschema:bookEdition<\/a> \"2nd ed.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/viaf.org\/viaf\/22964166<\/a>> ; # Paul Wolfe<\/span>\n\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/viaf.org\/viaf\/114796355<\/a>> ; # Mike Erwin<\/span>\n\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"1999<\/span>\" ;\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/viaf.org\/viaf\/20503400<\/a>> ; # Charlie Scott<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"1999<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/12567966<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic book<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/40800359<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Virtual private networks<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"54116280<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/54116280#PublicationEvent\/beijing_china_sebastopol_ca_o_reilly_1999<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/12567966#Agent\/o_reilly<\/a>> ; # O\'Reilly<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/books.google.com\/books?id=7gVTAAAAMAAJ<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/proquest.safaribooksonline.com\/1565925297<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/proxy.library.carleton.ca\/login?url=http:\/\/proquest.safaribooksonline.com\/?uiCode=carleton&xmlId=1565925297<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/VH7QX3XE2P.search.serialssolutions.com\/?V=1.0&L=VH7QX3XE2P&S=JCs&C=TC0000078552&T=marc&tab=BOOKS<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/www.safaribooksonline.com\/library\/view\/-\/1565925297\/?ar<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/catalog.hathitrust.org\/api\/volumes\/oclc\/40800359.html<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> \"https:\/\/www.safaribooksonline.com\/library\/view\/title\/1565925297\/?ar?orpq&email=^u<\/span>\" ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781565925298<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/54116280<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/004.6\/e21\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/12567966#Agent\/o_reilly<\/a>> # O\'Reilly<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"O\'Reilly<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/12567966#Place\/beijing_china<\/a>> # Beijing China<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Beijing China<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/12567966#Place\/sebastopol_ca<\/a>> # Sebastopol, CA<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Sebastopol, CA<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/12567966#Topic\/computernetwerken<\/a>> # Computernetwerken<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computernetwerken<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/12567966#Topic\/databescherming<\/a>> # Databescherming<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Databescherming<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/subjects\/sh94001277<\/a>> # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/authorities\/subjects\/sh95010396<\/a>> # Business enterprises--Computer networks<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Business enterprises--Computer networks<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/cc<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"cc<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/1146098<\/a>> # Telecommuting<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Telecommuting<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/842531<\/a>> # Business enterprises--Computer networks<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Business enterprises--Computer networks<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/872341<\/a>> # Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer networks--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/919023<\/a>> # Extranets (Computer networks)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Extranets (Computer networks)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/977184<\/a>> # Internet<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Internet<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/proxy.library.carleton.ca\/login?url=http:\/\/proquest.safaribooksonline.com\/?uiCode=carleton&xmlId=1565925297<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Safari (Access restricted to 5 simultaneous users)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/VH7QX3XE2P.search.serialssolutions.com\/?V=1.0&L=VH7QX3XE2P&S=JCs&C=TC0000078552&T=marc&tab=BOOKS<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"VIEW FULL TEXT<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/114796355<\/a>> # Mike Erwin<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1969<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Erwin<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Mike<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Mike Erwin<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/20503400<\/a>> # Charlie Scott<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Scott<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Charlie<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Charlie Scott<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/22964166<\/a>> # Paul Wolfe<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Wolfe<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Paul<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Paul Wolfe<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781565925298<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1565925297<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781565925298<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/oclc\/40800359<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"Virtual private networks.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/54116280<\/a>> ; # Virtual private networks<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/54116280<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/54116280<\/a>> ; # Virtual private networks<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2019-06-05<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/54116280#PublicationEvent\/beijing_china_sebastopol_ca_o_reilly_1999<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/12567966#Place\/sebastopol_ca<\/a>> ; # Sebastopol, CA<\/span>\n\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/12567966#Place\/beijing_china<\/a>> ; # Beijing China<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/12567966#Agent\/o_reilly<\/a>> ; # O\'Reilly<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n