Books & Videos

Table of Contents

  1. Chapter 1 Why Build a Virtual Private Network?

    1. What Does a VPN Do?

    2. Security Risks of the Internet

    3. How VPNs Solve Internet Security Issues

    4. VPN Solutions

    5. A Note on IP Address and Domain Name Conventions Used in This Book

  2. Chapter 2 Basic VPN Technologies

    1. Firewall Deployment

    2. Encryption and Authentication

    3. VPN Protocols

    4. Methodologies for Compromising VPNs

    5. Patents and Legal Ramifications

  3. Chapter 3 Wide Area, Remote Access, and the VPN

    1. General WAN, RAS, and VPN Concepts

    2. VPN Versus WAN

    3. VPN Versus RAS

  4. Chapter 4 Implementing Layer 2 Connections

    1. Differences Between PPTP, L2F, and L2TP

    2. How PPTP Works

    3. Features of PPTP

  5. Chapter 5 Configuring and Testing Layer 2 Connections

    1. Installing and Configuring PPTP on a Windows NT RAS Server

    2. Configuring PPTP for Dial-up Networking on a Windows NT Client

    3. Configuring PPTP for Dial-up Networking on a Windows 95 or 98 Client

    4. Enabling PPTP on Remote Access Switches

    5. Making the Calls

    6. Troubleshooting Problems

    7. Using PPTP with Other Security Measures

  6. Chapter 6 Implementing the AltaVista Tunnel 98

    1. Advantages of the AltaVista Tunnel System

    2. AltaVista Tunnel Limitations

    3. How the AltaVista Tunnel Works

    4. VPNs and AltaVista

  7. Chapter 7 Configuring and Testing the AltaVista Tunnel

    1. Getting Busy

    2. Installing the AltaVista Tunnel

    3. Configuring the AltaVista Tunnel Extranet and Telecommuter Server

    4. Configuring the AltaVista Telecommuter Client

    5. Troubleshooting Problems

  8. Chapter 8 Creating a VPN with the Unix Secure Shell

    1. The SSH Software

    2. Building and Installing SSH

    3. SSH Components

    4. Creating a VPN with PPP and SSH

    5. Troubleshooting Problems

    6. A Performance Evaluation

  9. Chapter 9 The Cisco PIX Firewall

    1. The Cisco PIX Firewall

    2. The PIX in Action

    3. Configuring the PIX as a Gateway

    4. Configuring the Other VPN Capabilities

  10. Chapter 10 Managing and Maintaining Your VPN

    1. Choosing an ISP

    2. Solving VPN Problems

    3. Delivering Quality of Service

    4. Security Suggestions

    5. Keeping Yourself Up-to-Date

  11. Chapter 11 A VPN Scenario

    1. The Topology

    2. Central Office

    3. Large Branch Office

    4. Small Branch Offices

    5. Remote Access Users

    6. A Network Diagram

  1. Appendix Emerging Internet Technologies

    1. IPv6

    2. IPSec

    3. S/WAN

  2. Appendix Resources, Online and Otherwise

    1. Software Updates

    2. The IETF

    3. CERT Advisories

    4. The Trade Press

    5. Networking and Intranet-Related Web Sites

    6. Usenet Newsgroups

    7. Mailing Lists

  3. Colophon