Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/virtual-private-networks-technologies-and-solutions/yuan/descriptif_1188802
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=1188802

Virtual private networks Technologies and Solutions

Langue : Anglais

Auteurs :

Couverture de l’ouvrage Virtual private networks

The hands-on, real-world "how-to" guide for building and managing VPNs.

  • VPN architecture, tunneling, IPsec, authentication, public key infrastructure, and much more.
  • The latest networking title in the renowned Addison-Wesley Professional Computing Series.
  • By two of the worlds leading VPN implementers!
VPNs enable any enterprise to utilize the Internet as its own secure private network. In this book, two leading VPN implementers offer a start-to-finish, hands-on guide to constructing and operating secure VPNs. Going far beyond the theory found in most books, Ruixi Yuan and Tim Strayer present best practices for every aspect of VPN deployment, including tunneling, IPsec, authentication, public key infrastructure, and network/service management. Strayer and Yuan begin with a detailed overview of the fundamental concepts and architectures associated with enterprise VPNs, including site-to-site VPNs, remote access VPNs, and extranets. They compare all options for establishing VPN tunnels across the Internet, including PPTP, L2F, and L2TP. Next, they present in-depth coverage of implementing IPsec, establishing two-party or trusted third-party authentication, building a robust public key infrastructure, and managing access control. The book includes expert coverage of VPN gateway configuration, provisioning, and management, Windows and other VPN clients, and network/service management, including SLAs and network operations centers. Finally, the authors preview the future of VPNs, showing how they may be enhanced to provide greater quality of service and network intelligence. For all networking and IT professionals, security specialists, consultants, vendors, and service providers responsible for building or operating VPNs.

Ruixi Yuan, Ph.D., has conducted R&D at NEC Computer and Communication Research Labs, GTE Labs, and BBN Technologies. He architected GTE Internetworkings VPN Advantage service, and now is product manager for the service. Tim Strayer, Ph.D., has served as a researcher at both Sandia National Laboratories and BBN Technologies He led the group that built GTE Internetworkings VPN Advantage Internet service.

I. VPN FUNDAMENTALS.

1. Introduction.
Business Communication.
VPN Motivation.
The VPN Market.
VPN Technologies.
VPN Solutions.

2. Basic Concepts.
A Brief History of the Internet.
Network Architecture.
Network Topology.
The Need for Security.
Cryptography.

3. VPN Architectures.
Site-to-Site Intranet VPNs.
Remote Access VPNs.
Extranet VPNs.
A Security Services Taxonomy.

II. VPN TECHNOLOGIES.

4. Tunnels.
Tunneling.
Data Integrity and Confidentiality.
VPN Tunneling Protocols.

5. IPsec.
Basic IPsec Concepts.
Authentication Header.
Encapsulating Security Payload.
Internet Key Exchange.
IPsec Implementation.

6. Authentication.
Two-Party Authentication.
Trusted Third-Party Authentication.
Authentication in VPNs.

7. Public Key Infrastructures.
PKI Architecture.
Digital Certificate Formats.
Certificate Management System.
Certificate Protocols.
Certificate Use in VPNs.

8. Access Control.
Access Control Policy.
Access Control Mechanisms.
Access Control Policy Management.
Access Control in VPNs.

III. VPN SOLUTIONS.

9. VPN Gateways.
VPN Gateway Functions.
Gateway Configuration and Provisioning.
Gateway Management.
Gateway Certification.
Interaction with Firewalls.
VPN Design Issues.
A VPN Solution Scenario.

10. VPN Clients.
VPN Client Functions.
Operating System Issues.
Operational Issues.
VPN Clients for Windows.
VPN Clients for Other Platforms.
Alternative VPN Clients.
A Remote Access VPN Scenario.

11. VPN Network and Service Management.
Network Management Standards.
Network Management Architecture.
SNMP.
VPN Management.
Service Management.
International Issues.

12. VPN Directions: Beyond Connectivity.
Evolution of Network Infrastructure.
Evolution of VPNs.
Internetworking Beyond Connectivity.

Acronyms.
References.
Index.

Ruixi Yuan is a network researcher focusing on high-speed networking and security. He was the architect of Genuity's VPN Advantage Service and served as its product manager. In addition, he has conducted research and development in computer and communication networks at NEC, GTE Laboratories, and BBN Technologies. W. Timothy Strayer is a senior scientist at BBN Technologies where he conducts research on network protocols, routing infrastructures, computer security, and network management and monitoring systems for VPNs. Prior to BBN, he was a senior network researcher at Sandia National Laboratories. He co-authored the book, XTP: The Xpress Transfer Protocol (Addison-Wesley, 1992).

0201702096AB04062001

Date de parution :

Ouvrage de 316 p.

24x19.2 cm

Sous réserve de disponibilité chez l'éditeur.

Prix indicatif 47,32 €

Ajouter au panier