+612 9045 4394
 
CHECKOUT
Virtual Private Networks : Making the Right Connection - Dennis Fowler

Virtual Private Networks

Making the Right Connection

Paperback

Published: 1st May 1999
Ships: 7 to 10 business days
7 to 10 business days
$152.35
or 4 easy payments of $38.09 with Learn more
if ordered within

Network-dependent companies are excited by the benefits promised by the virtual private network, including lower costs, greater flexibility, and improvements in connectivity. But they also have questions: What benefits are real? How can they be measured? What are the expenses and the dangers?

Virtual Private Networks: Making the Right Connection is an intelligent introduction written especially for business and IT professionals who want a realistic assessment of what a VPN can provide for their organizations. Covering advantages and risks, this book expands your understanding of what you can do with a VPN, while detailing all that implementing it will demand of you. With its help, you'll find your way through VPN hype to the answers you need to make sound decisions.

* Thoroughly explains VPN concepts and technologies, and examines the potential of VPNs as intranets, extranets, and remote access solutions.
* Covers essential VPN topics like tunneling, encapsulation, encryption, security, and protocols.
* Provides detailed points of comparison between typical VPN costs and the costs of maintaining traditional WANs.
* Offers frank consideration of the hidden costs and risks sometimes associated with VPNs, helping you decide if a VPN is right for you.
* Lists and assesses the software and hardware products you may need to implement a VPN.
* Discusses both Internet-based VPNs and VPN services offered by providers of "private" ATM and frame relay networks, detailing the pros and cons of each.

"Dennis Fowler provides an insightful view to both the business benefits and technical requirements to VPNs. His examples of other customers' experiences with VPNs breathe life into the discussion."
--From the Foreword by Susan Scheer Aoko, Cisco systems, Inc.

Forewordp. vii
Prefacep. xv
Defining the Virtual Private Networksp. 1
What Is a VPN?p. 2
What a VPN Is Good for and Why You Should Consider Building Onep. 5
Economies of Sharingp. 6
Flexibilityp. 8
Worldwide Connectivity on a Budgetp. 10
The VPN and the Mobile Workforcep. 11
Every Silver Lining Has a Cloudp. 17
How a VPN Worksp. 18
Tunnelingp. 18
Securing the Datap. 19
Making the Combination Workp. 20
Where We Go from Herep. 21
How to Use a VPNp. 23
The VPN for Remote Accessp. 23
A Medical Software Companyp. 24
The Prudential Insurance Company of Americap. 25
The VPN as an Extranetp. 27
Automotive Network eXchangep. 27
Open Access Same-Time Information Systems (OASIS)p. 31
The VPN as an Intranetp. 33
Mazzio's Corporationp. 33
Galaxy Scientific Corporationp. 36
Conclusionp. 38
The Downside to VPNsp. 39
Do You Really Need a VPN?p. 39
Connection Availabilityp. 40
Securityp. 41
Snooping or Sniffingp. 42
Capturing Addressesp. 42
Session Hijackingp. 43
Data Tamperingp. 43
The Lack of Standardsp. 44
Performance/Quality of Servicep. 46
Hidden Costsp. 47
Managementp. 47
Fitting It In with Your Architecturep. 48
End User Trainingp. 49
Security, Againp. 50
Conclusionp. 50
Internet Versus Other VPNsp. 51
Clearing Up Some Confusionp. 51
The Internetp. 52
TCP/IP on Other Networksp. 56
Frame Relay, ATM, and TCP/IPp. 56
The Internet Versus Private Servicesp. 56
The Frame Relay Advantagesp. 57
An Example of a Frame Relay VPNp. 61
The Trade-Offsp. 64
The Cost Factorp. 64
Flexibilityp. 66
Securityp. 67
Reliability and Accountabilityp. 68
Customer Services and Technical Supportp. 68
Conclusionp. 69
Encryptionp. 71
An Overview of Encryptionp. 72
Secret Key (Symmetric) Cryptosystemsp. 75
Public Key (Asymmetric) Cryptosystemsp. 78
Diffie-Hellman Encryptionp. 79
RSA Encryptionp. 81
Other Public Key Systemsp. 85
Digital Signatures, Hashing, and Message Authentication Codesp. 85
Putting It All Togetherp. 88
Conclusionp. 89
User Authentication, Authorization, and Key Managementp. 91
User Authenticationp. 91
The Username/Password Challengep. 92
VPN User Authentication: The Simplest Scenariop. 94
Central Authoritiesp. 94
Key Management and Certificate Authoritiesp. 99
Certificate Authoritiesp. 101
The ITU-TX.509 Certificate Standard and the Public Key Infrastructurep. 103
Public Key Cryptography Standardsp. 104
Lightweight Directory Access Protocol and VPNsp. 104
Making the Connection: More than Just Managing Keysp. 104
ISAKMP/Oakley (IKE)p. 105
Conclusionp. 110
Tunneling and the VPN Protocol Suitesp. 111
Tunnelingp. 112
The IP Packet and Encapsulationp. 112
VPNs and the Open System Interconnection Modelp. 115
Packet-Oriented VPN Protocolsp. 117
Point-to-Point Tunneling Protocolp. 117
Layer 2 Forwarding Protocolp. 120
Layer 2 Tunneling Protocolp. 120
AltaVista Tunneling Protocolp. 121
IPSecp. 122
Simple Key Management for Internet Protocolsp. 128
Application-Oriented VPN Protocolsp. 131
Secure SHellp. 131
SOCKS v.5 Network Security Protocolp. 132
Sun.NETp. 133
Quality of Service Protocols and VPNsp. 133
Conclusionp. 134
Architecturep. 135
Software Versus Hardware Solutionsp. 135
Hiding Your LANp. 137
User Authenticationp. 138
The Basic Scenariosp. 138
The Client-to-LAN VPNp. 138
The LAN-to-LAN VPNp. 146
Conclusionp. 151
Planning Your VPNp. 153
Analyze Your Needsp. 153
Consider the Possibilitiesp. 154
Look at What You Are Doing Nowp. 154
Take a Detailed Inventory of Your Resourcesp. 155
Inventory Your Material Resourcesp. 156
Inventory Your Human Resourcesp. 158
Outsourced Versus In-Housep. 158
Establish the Goals for Your VPNp. 161
Plan for the Evolution/Expansion of the Networkp. 163
Begin to Sketch Out a Budgetp. 163
Study All Your Optionsp. 164
Develop an Architecturep. 164
A Review of the Protocolsp. 165
IPSec Is a Developing Industry Standardp. 168
The Ready Availability of PPTP and L2TPp. 168
SKIP Is Being Marginalized in the Marketp. 169
AltaVista, SOCKS v.5, and Secure SHell Are Niche Productsp. 169
Sun.NET Is an Unproven Productp. 170
Evaluate Products and Vendorsp. 170
Define a Pilot Projectp. 172
Plan on a Phased Rolloutp. 172
Conclusionp. 173
Administration and Managementp. 175
Securityp. 176
The First Line of Defensep. 177
Beware of Back Doorsp. 180
Security Through Obscurityp. 181
Keeping the VPN Upp. 181
Service Level Agreementsp. 182
Managing Performance on Your Partp. 183
Managing One Big Networkp. 184
Conclusionp. 186
VPN Developers, Vendors, and Service Providersp. 189
Resourcesp. 195
Glossaryp. 199
Bibliographyp. 207
Indexp. 211
Table of Contents provided by Syndetics. All Rights Reserved.

ISBN: 9781558605756
ISBN-10: 1558605754
Series: Morgan Kaufmann Series in Networking (Paperback)
Audience: General
Format: Paperback
Language: English
Number Of Pages: 350
Published: 1st May 1999
Publisher: Elsevier Science & Technology
Country of Publication: US
Dimensions (cm): 22.94 x 17.88  x 1.73
Weight (kg): 0.44