BN.com Gift Guide

Building and Managing Virtual Private Networks

Overview

Everything you need to know about selecting, designing, building, and managing the right VPN for your company Building and Managing Virtual Private Networks Get complete answers to all your VPN questions in Building and Managing Virtual Private Networks. International networking guru Dave Kosiur provides a candid assessment of the current state of VPN technology. With the help of fascinating and informative case studies based on the experiences of organizations at the forefront of the VPN revolution, he clearly ...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (10) from $1.99   
  • New (1) from $10.00   
  • Used (9) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$10.00
Seller since 2005

Feedback rating:

(1625)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
New

Ships from: Fort Worth, TX

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Everything you need to know about selecting, designing, building, and managing the right VPN for your company Building and Managing Virtual Private Networks Get complete answers to all your VPN questions in Building and Managing Virtual Private Networks. International networking guru Dave Kosiur provides a candid assessment of the current state of VPN technology. With the help of fascinating and informative case studies based on the experiences of organizations at the forefront of the VPN revolution, he clearly explains the basic concepts and technologies involved, as well as the business reasons for making the switch to an Internet-based network. And he provides practical guidance on all aspects of designing, building, and managing the best VPN for your organization. You get the complete lowdown on:
* The pros and cons of all VPN types now available
* All major classes of VPN hardware and software
* Key VPN design issues and business solutions
* Detailed cost comparison
* Selecting the right ISP for your VPN
* Building a high-performance extranet
* Remote access
* VPN security threats and solutions, including best-in-class cryptographic techniques
* Firewalls and routers

Designed for business professionals, IT managers and network managers, this informed, objective and technically oriented text discusses VPN construction, maintenance and business enterprises. Author Dave Kosiur points out that one of the most confusing aspects of VPNs is that all vendors have their own definitions and ideas of what constitutes VPNs and none of them agree. This publication admirably sorts out VPN technologies, procedures and concepts.

Read More Show Less

Editorial Reviews

Booknews
Provides business and IS managers, system administrators, and network managers with background information necessary to understand the concepts, protocols and systems associated with Internet-based virtual private networks (VPNs). The information is intended to help a business decide whether to deploy a VPN and what might be the best way to do so. Discussion includes security threats and solutions, Internet service providers, firewalls and routers, and hardware and software. Annotation c. by Book News, Inc., Portland, Or.
Read More Show Less

Product Details

  • ISBN-13: 9780471295266
  • Publisher: Wiley
  • Publication date: 1/28/1998
  • Edition number: 1
  • Pages: 416
  • Product dimensions: 7.49 (w) x 9.20 (h) x 0.88 (d)

Meet the Author

DAVE KOSIUR, PhD, is a networking consultant and former product manager for PSInet. He is also the award-winning author of several bestselling networking guides, including The MacWorld Networking Bible, How Local Area Networks Work, Understanding Electronic Commerce, and IP Multicasting: The Complete Guide to Interactive Corporate Networks. He also regularly writes on networking and security issues for PC Week, Sunworld Online, and ZD Internet Computing.
Read More Show Less

Read an Excerpt

We now come to the last group of VPN products that well cover in this book-software. This group is somewhat of a diverse collection because it covers any software that isn't specifically aimed as an addition to either firewalls or routers, which we covered in Chapter 10, "Firewalls and Routers." Many of the software products covered in this chapter parallel the hardware we covered in Chapter 11, "VPN Hardware," in which a number of different VPN and network services are provided in a bundled product. As you go through this chapter, you'll see that it includes some of the major Network OSs (NOS), such as NetWare and Windows NT, as well as products specifically created for forming and maintaining secure tunnels (AltaVista Tunnel and F-Secure VPN), along with software that can be used for host-to-host tunnels without the need for an intervening security gateway.

It's true that some of the products covered previously, particularly certain firewall products, are also software-based, in which the buyer gets to select the computing platform. But, these products easily fit into the category of firewalls; whereas the products we'll discuss in this chapter cannot be easily categorized. In many ways, this chapter covers a grab-bag of different software products but ones that may be important enough to play a role in the construction of your VPN.

Different Products for Different VPNs

Two classes of software are worth mentioning here. One is composed of the products that provide VPN services for a LAN, much like the hardware that was discussed in Chapter 11. The second class of products are those that can be used for host-to-host tunneling withoutthe need for a security gateway.

The products that provide VPN services for a LAN cover the full gamut of tunneling and VPN approaches, some offering support for the protocols we've covered in this book, and others using proprietary approaches to tunneling and key management.

The evolution of VPN standards, their requisite infrastructures (for digital certificates, for instance), and the cur-rent networking marketplace have made LAN-centric solutions a higher priority than host-to-host solutions, which has made the choices for host-to-host software rather small in number so far. Although a few shrink-wrapped products can be used for secure host-to-host connections, some commercially available software development kits (SDKs) let developers create their own IPSec-compatible programs.

Tunneling Software

Earlier in this book, when we described tunneling, we pointed out that tunneling was nothing more than encapsulating one packet inside another. In some cases, like with the MBone, the experimental multicasting backbone on the Internet, no effort is made to protect the encapsulated packets. And, with PPTP for example, the amount of protection offered by encryption is rather weak because of the methods employed. IPSec, on the other hand, creates tunnels by applying strong encryption methods to the encapsulated packets.

Now, with VPN software, we see that encrypting encapsulated packets to form tunnels can be done in other ways as well. Of the products covered in this chapter, four use their own proprietary methods for tunneling. And, of course, not one of the methods is compatible with any of the others.

There's much to be said for standards and interoperable products, such as we're seeing with IPSec. Being able to pick and choose among vendors enables you to purchase the best products for your needs without feeling tied to a single vendor; these days, it's highly unlikely that any one vendor has a lock on the best networking technology. (Of course, you still have to worry about configuring and managing these different devices if you buy from more than one vendor. Businesses often will go with a single vendor to avoid management and maintenance hassles.)

With the strong move to standardize VPNs using IPSec and L2TP (and PPTP, to a lesser extent), is it wise to use proprietary solutions like the ones mentioned in this chapter? In general, little advantage is gained by using proprietary solutions. A few of these products were some of the first ones created for Internet-based VPNs and thus precede many of the standards efforts. Although we'd much rather use standards-based solutions, we're including the proprietary products for the sake of completeness.

Also keep in mind that vendors change their products over time in response to market pressures. At least two of the products covered here-AltaVista Tunnel and Borderguard-are supposed to include IPSec support before long. Starting out with a proprietary product doesn't keep you from being interoperable with other standards later.

It's also possible to use standard protocols other than IPSec and L2TP to create VPNs. Aventail's use of SOCKS v5 is one such example (see Chapter 10). Another example is DataFellows' use of Secure SHell (SSH) in their F-Secure product. SSH is familiar to Unix system administrators for securing communications and has been used on a variety of networks (by NASA and some banks, for instance) for securely transmitting data. Unlike the protocols we've discussed in this book, however, SSH works at the transport layer.

VPNs and NOS-Based Products

Although there will come a time when the authentication and encryption functions of VPNs will be included in each computer as part of the operating system, we're currently forced to rely on using security gateways or remote client software to create VPNs. As a first step to provide VPN support in some of the Network Operating Systems, companies like Microsoft and Novell have started to provide security gateway functions in their NOS software.

We've already mentioned that Microsoft was the first to provide a tunnel server for PPTP in their Routing and Remote Access Server (RRAS) product for Windows NT 4.0. Although RRAS is designed to serve as a tunneling server for PPTP (and eventually L2TP) tunnels, either for LAN-toLAN or host-to-LAN VPNs, it's not a bundling of security services like some other products. For example, RRAS has a very limited packet filtering system-you either pass PPTP packets or nothing at all. To add the security of a firewall to control access with a finer granularity, you need to add Microsofts Proxy Server to your server machine....

Read More Show Less

Table of Contents

THE INTERNET AND BUSINESS.

Business on the Internet.

Virtual Private Networks.

A Closer Look at Internet VPNs.

SECURING AN INTERNET VPN.

Security: Threats and Solutions.

Using IPSec to Build a VPN.

Using PPTP to Build a VPN.

Using L2TP to Build a VPN.

Designing Your VPN.

BUILDING BLOCKS OF A VPN.

The ISP Connection.

Firewalls and Routers.

VPN Hardware.

VPN Software.

MANAGING A VPN.

Security Management.

IP Address Management.

Performance Management.

LOOKING AHEAD.

Extending VPNs to Extranets.

Future Directions.

Appendices.

Glossary.

Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)