A Technical Guide to IPSec Virtual Private Networks / Edition 1

A Technical Guide to IPSec Virtual Private Networks / Edition 1

4.6 6
by James S. Tiller
     
 

View All Available Formats & Editions

ISBN-10: 0849308763

ISBN-13: 9780849308765

Pub. Date: 12/28/2000

Publisher: Taylor & Francis

A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years o f experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, op erations, and security. Starting with a primer on the IP protocol suit e, the book

Overview

A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years o f experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, op erations, and security. Starting with a primer on the IP protocol suit e, the book travels layer by layer through the protocols and the techn ologies that make VPNs possible. It includes security theory, cryptogr aphy, RAS, authentication, IKE, IPSec, encapsulation, keys, and polici es. After explaining the technologies and their interrelationships, th e book provides sections on implementation and product evaluation. A T echnical Guide to IPSec Virtual Private Networks arms information secu rity, network, and system engineers and administrators with the knowle dge and the methodologies to design and deploy VPNs in the real world for real companies.

Product Details

ISBN-13:
9780849308765
Publisher:
Taylor & Francis
Publication date:
12/28/2000
Edition description:
New Edition
Pages:
376
Product dimensions:
7.00(w) x 10.00(h) x 0.70(d)

Table of Contents

Introduction
Know the Terrain
The Internet
TCP/IP Quickie
Information Age
Security Concepts
Cryptography
The Other Guys
Why are "VPNs" So HOT?
IP Security Primer
History
Structure
Applications
Quality of Service
Policy
Encryption
Symmetrical Encryption
Asymmetrical Encryption
Message Authentication Code
Perfect Forward Secrecy
Diffie-Hellman
IPSEC Architecture
Domain of Interpretation
Security Associations
Transport Mode
Tunnel Mode
Authentication
Shared Secret
Certificates
Public Key Cryptography
Non-IPSec Authentication
Security Protocols
Encapsulating Security Payload
Authentication Header
Key Management
The Roll of Key Management
Creating IKE for IPSec
Phase One
Phase Two
Implementation Considerations
Network to Network
Client to Network
Client Interaction
Rollout Concepts
Product Evaluation
Business Drivers
Grading Methodology
Lab Testing
Pilot Processes
Trend Analysis

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

A Technical Guide to IPSec Virtual Private Networks 4.7 out of 5 based on 0 ratings. 6 reviews.
Guest More than 1 year ago
This is a very good book! Written very simply, yet concisely. I work with VPN's on a daily basis and find the book to be an amazing resource. Highly recommend for the experienced network admin or someone seeking to know more about VPN's in general.
Guest More than 1 year ago
Very informative and direct for the answers I was looking for.
Guest More than 1 year ago
Book is technically sound. Author depicts a strong command of secure technologies.
Guest More than 1 year ago
Mr Tiller has great command of knowledge in this field. Very insightful yet easy to read.
Guest More than 1 year ago
I love the way this author breaks down VPNs into plain, easy to comprehend reading. With more and more companies scrambling to secure the company confidential information of their 'telecommuting' workforce, this book is going to help the IT professional understand how it is done. Great Job Mr. Tiller!
Guest More than 1 year ago
I was lucky enough to come across this book at a book show in New York. I am happy to see that an author has seen fit to properly address what is becoming a hot technology for enterprise businesses as well as service providers. Mr. Tiller obviously speaks from the voice of experience, as opposed to some works I have seen which are products of cut and paste artists. I particularly enjoyed the section on IKE. This is a commonly misunderstood yet essential component in any secure remote access architecture. The book is easy enough for most security neophytes to understand yet still meaty enough to satisfy and teach veteran bit-heads. Read this book and then keep it nearby. I hope the author has more books planned, this was great.