Flylib.com
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Mark Lewis
BUY ON AMAZON
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
What Is a Virtual Private Network?
VPN Devices
Deploying Site-to-Site and Remote Access VPNs: A Comparison
Summary
Review Questions
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Benefits and Drawbacks of L2TPv3-Based L2VPNs
L2TPv3 Pseudowire Operation
Configuring and Verifying L2TPv3 Pseudowires
Summary
Review Questions
Designing and Implementing AToM-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Benefits and Drawbacks of AToM-Based L2VPNs
AToM Pseudowire Operation
Deploying AToM Pseudowires
Implementing Advanced AToM Features
Summary
Review Questions
Designing MPLS Layer 3 Site-to-Site VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advantages and Disadvantages of MPLS Layer 3 VPNs
MPLS Layer 3 VPNs Overview
A Detailed Examination of MPLS Layer 3 VPNs
Deploying MPLS Layer 3 VPNs
Summary
Review Questions
Advanced MPLS Layer 3 VPN Deployment Considerations
Advanced MPLS Layer 3 VPN Deployment Considerations
The Carriers Carrier Architecture
The Inter-Autonomous System/Interprovider MPLS VPN Architecture
Supporting Multicast Transport in MPLS Layer 3 VPNs
Implementing QoS for MPLS Layer 3 VPNs
Supporting IPv6 Traffic Transport in MPLS Layer 3 VPNs Using 6VPE
Summary
Review Questions
Deploying Site-to-Site IPsec VPNs
Deploying Site-to-Site IPsec VPNs
Advantages and Disadvantages of IPsec Site-to-Site VPNs
IPsec: A Security Architecture for IP
Deploying IPsec VPNs: Fundamental Considerations
Summary
Review Questions
Scaling and Optimizing IPsec VPNs
Scaling and Optimizing IPsec VPNs
Scaling IPsec Virtual Private Networks
Ensuring High Availability in an IPsec VPN
Designing QoS for IPsec VPNs
MTU and Fragmentation Considerations in an IPsec VPN
Summary
Review Questions
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Benefits and Drawbacks of L2TP Remote Access VPNs
Operation of L2TP Voluntary/Client-Initiated Tunnel Mode
Implementing L2TP Voluntary/Client-Initiated Tunnel Mode Remote Access VPNs
Designing and Implementing L2TP Compulsory/NAS-Initiated Tunnel Mode Remote Access VPNs
Integrating L2TP Remote Access VPNs with MPLS VPNs
Summary
Review Questions
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Comparing IPsec Remote Access VPNs with Other Types of Remote Access VPNs
Understanding IKE in an IPsec Remote Access VPN Environment
Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication
Summary
Review Questions
Designing and Building SSL Remote Access VPNs (WebVPN)
Designing and Building SSL Remote Access VPNs (WebVPN)
Comparing SSL VPNs to Other Types of Remote Access VPNs
Understanding the Operation of SSL Remote Access VPNs
Using Clientless SSL Remote Access VPNs (WebVPN) on the Cisco VPN 3000 Concentrator
Implementing Full Network Access Using the Cisco SSL VPN Client
Strengthening SSL Remote Access VPNs Security by Implementing Cisco Secure Desktop
Enabling SSL VPNs (WebVPN) on Cisco IOS Devices
Deploying SSL VPNs (WebVPN) on the ASA 5500
Summary
Review Questions
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix A. VPLS and IPLS Layer 2 VPNs
Understanding VPLS
Understanding IPLS
Summary: Comparing VPLS and IPLS
Appendix B. Answers to Review Questions
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors:
Mark Lewis
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Basic Commands, Variables, and Data Types
Making Programs Think Branching Statements and Subroutines
More Power to the Numbers Data Sequences and Arrays
Fundamentals of 3D Graphics Programming
Epilogue
Qshell for iSeries
Running Qshell
The EDTF Text Editor
Sed
Application Development Tools
The Perl Utility
WebLogic: The Definitive Guide
Packaging and Deployment
Development Guidelines
The Security Provider Architecture
Configuring Trust Between Two Domains
XML Application Scoping
Developing Tablet PC Applications (Charles River Media Programming)
Basics of the .NET Framework
Strings, GDI+, and Error Handling in VB .NET
Creating an MP3 Player
Speech Input with SAPI
Power Management for the Tablet PC
Information Dashboard Design: The Effective Visual Communication of Data
All That Glitters Is Not Gold
Even Dashboards Have a History
Characteristics of a Well-Designed Dashboard
Select the Best Display Medium
Sample Sales Dashboard
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Saving and Retrieving the Buffer
Transactions
Scripting Issues with iSQL*Plus
Synonyms
Section B.3. Formatting Dates
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies