Ipsec Securing Vpns PDF EPUB Download

Ipsec Securing Vpns also available in docx and mobi. Read Ipsec Securing Vpns online, read in mobile or Kindle.

IPSec

Securing VPNs

Author: Carlton R. Davis

Publisher: McGraw-Hill Osborne Media

ISBN:

Category: Computers

Page: 404

View: 711

Written in conjunction with RSA Security - the most trusted name in e-security - this book gives a presentation of IPSec components, implementation, and VPN interoperability. It is a part of the RSA Press series.

Cisco Secure Virtual Private Networks

Author: Andrew G. Mason

Publisher: Cisco Systems

ISBN:

Category: Computers

Page: 388

View: 902

With the recent availability of high-speed Internet connections to the home and the continued move of workers out of central office locations (whether for travel, telecommuting, or branch office expansion), Virtual Private Networks (VPNs) have become a critical part of corporate network architectures. VPNs use advanced encryption and tunneling to permit your organization to establish secure, end-to-end, private network connections over third-party networks, such as the Internet. This new networking paradigm not only adds to the efficiency of the corporate workforce, but it also saves money by leveraging third-party networks and allows you to scale your networks with greater ease. Based on the official instructor-led training course of the same name, Cisco Secure Virtual Private Networks is a comprehensive, results-oriented book designed to give you the knowledge you need to plan, deploy, and manage VPNs in your network environment. Beginning with an overview of VPNs and IPSec, the book introduces you to the Cisco VPN family of products. It then delves into the details of configuring and troubleshooting IPSec site-to-site VPNs on Cisco IOS(r) routers and Cisco PIX(r) Firewalls using preshared keys and digital certificates. You learn how to install the VPN 3000 Concentrator and how to configure it for remote access using preshared keys and digital certificates. Monitoring and administration techniques are also presented. The book concludes with a discussion on the scalability solutions available for IPSec VPNs. Each chapter includes an explicit set of learning objectives and concludes with a set of review questions to assess your understanding of the material. Numerous examples are provided throughout, and detailed diagrams help clarify concepts presented in the text. Whether you are preparing for the Cisco Security Specialist 1 certification or simply want to understand and make the most efficient use of VPNs, Cisco Secure Virtual Private Networks provides you with a complete solution for designing, implementing, and managing Cisco VPN networks. Prepare for the Cisco Security Specialist 1 VPN exam with the official CSVPN Coursebook Evaluate the features, functions, and benefits of Cisco VPN products Understand the component technologies that are implemented in Cisco VPN products Learn the procedures, steps, and commands required to configure and test IPSec in Cisco IOS Software and the Cisco PIX Firewall Install and configure the Cisco VPN client to create a secure tunnel to a Cisco VPN Concentrator and Cisco PIX Firewall Configure and verify IPSec in the Cisco VPN Concentrator, Cisco router, and Cisco PIX Firewall Enable interoperability among the Cisco VPN Concentrator, Cisco routers, and Cisco PIX Firewalls Apply scalability and advanced configuration features supported in the Cisco IPSec implementation Andrew G. Mason, CCIE(r) #7144, CSS-1, CCNP(r): Security, and CCDP(r), is the CEO of three UK-based companies: Mason Technologies, CCStudy.com, and Boxing Orange. Andrew has 11 years experience in the networking industry and is currently consulting for the largest ISP in the UK. He is involved daily in the design and implementation of complex secure hosted solutions utilizing products from the Cisco Secure family.

Network World

Author:

Publisher:

ISBN:

Category:

Page: 60

View: 319

For more than 20 years, Network World has been the premier provider of information, intelligence and insight for network and IT executives responsible for the digital nervous systems of large organizations. Readers are responsible for designing, implementing and managing the voice, data and video systems their companies use to support everything from business critical applications to employee collaboration and electronic commerce.

A Technical Guide to IPSec Virtual Private Networks

Author: James S. Tiller

Publisher: CRC Press

ISBN:

Category: Computers

Page: 376

View: 788

What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become. A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security. Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies. After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.

CCSP Cisco Secure VPN Exam Certification Guide

CCSP Self-study

Author: John F. Roland

Publisher: Cisco Press

ISBN:

Category: Computers

Page: 562

View: 217

The official study guide for the Cisco Secure VPN exam #9E0-121 The only Cisco authorized exam certification guide for the new CSVPN exam Pre- and post-chapter quizzes help assess knowledge and identify areas of weakness Overviews and Foundation Summaries present complete and quick review of all CSVPN exam topics CD-ROM test engine provides practice with more than 200 questions As security demands continue to increase for enterprise and service provider networks, the number of employees working from remote locations requiring an efficient and rapid virtual private network connection grows as well. The Cisco Secure line of products and services are focused on providing the seamless operation of these remote networks with the maximum level of security available. Organizations using this suite of products and services need networking professionals with proven skills at getting the highest levels of both security and network operability. This need has created a booming demand for the Cisco Systems security certifications that verify those skills and abilities. The CSVPN exam is one of the components of the Cisco Systems security designation. "CSS-1 Cisco Secure VPN Exam Certification Guide" provides CSVPN exam candidates with a comprehensive preparation tool for testing success. With pre- and post-chapter tests, a CD-ROM-based testing engine with more than 200 questions, and comprehensive training on all exam topics, this title brings the proven exam preparation tools from the popular Cisco Press Exam Certification Guide series to the CSVPN candidate. John Roland, CCNP, CCDP, CSS-1, is a security specialist for Ajilon Consulting and has worked in the IT field for more than 22years--from COBOL programming on IBM mainframes, to LAN/WAN implementation on military networks, to developing Cisco certification training materials. Mark J. Newcomb is the owner and lead Security Engineer for Secure Networks in Spokane, Washington. Mark has more than 20 years experience in the networking industry, focusing on the financial and medical industries.

IPSec

The New Security Standard for the Internet, Intranets, and Virtual Private Networks

Author: Naganand Doraswamy

Publisher: Prentice Hall Professional

ISBN:

Category: Computers

Page: 262

View: 799

IPSec, Second Edition is the most authoritative, comprehensive, accessible, and up-to-date guide to IPSec technology. Two leading authorities cover all facets of IPSec architecture, implementation, and deployment; review important technical advances since IPSec was first standardized; and present new case studies demonstrating end-to-end IPSec security. New coverage also includes in-depth guidance on policies, updates on IPSec enhancements for large-scale enterprise environments, and much more.

VPNs Illustrated

Tunnels, VPNs, and IPsec

Author: Jon C. Snader

Publisher: Addison-Wesley Professional

ISBN:

Category: Computers

Page:

View: 431

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." By learning to read and interpret various network traces, such as those produced by tcpdump, readers will be able to better understand and troubleshoot VPN and network behavior. Specific topics covered include: Block and stream symmetric ciphers, such as AES and RC4; and asymmetric ciphers, such as RSA and EIGamal Message authentication codes, including HMACs Tunneling technologies based on gtunnel SSL protocol for building network-to-network VPNs SSH protocols as drop-in replacements for telnet, ftp, and the BSD r-commands Lightweight VPNs, including VTun, CIPE, tinc, and OpenVPN IPsec, including its Authentication Header (AH) protocol, Encapsulating Security Payload (ESP), and IKE (the key management protocol) Packed with details, the text can be used as a handbook describing the functions of the protocols and the message formats that they use. Source code is available for download, and an appendix covers publicly available software that can be used to build tunnels and analyze traffic flow. VPNs Illustrated gives you the knowledge of tunneling and VPN technology you need to understand existing VPN implementations and successfully create your own.

IKEv2 IPsec Virtual Private Networks

Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS

Author: Graham Bartlett

Publisher: Cisco Press

ISBN:

Category: Computers

Page: 656

View: 636

Create and manage highly-secure Ipsec VPNs with IKEv2 and Cisco FlexVPN The IKEv2 protocol significantly improves VPN security, and Cisco’s FlexVPN offers a unified paradigm and command line interface for taking full advantage of it. Simple and modular, FlexVPN relies extensively on tunnel interfaces while maximizing compatibility with legacy VPNs. Now, two Cisco network security experts offer a complete, easy-tounderstand, and practical introduction to IKEv2, modern IPsec VPNs, and FlexVPN. The authors explain each key concept, and then guide you through all facets of FlexVPN planning, deployment, migration, configuration, administration, troubleshooting, and optimization. You’ll discover how IKEv2 improves on IKEv1, master key IKEv2 features, and learn how to apply them with Cisco FlexVPN. IKEv2 IPsec Virtual Private Networks offers practical design examples for many common scenarios, addressing IPv4 and IPv6, servers, clients, NAT, pre-shared keys, resiliency, overhead, and more. If you’re a network engineer, architect, security specialist, or VPN administrator, you’ll find all the knowledge you need to protect your organization with IKEv2 and FlexVPN. Understand IKEv2 improvements: anti-DDoS cookies, configuration payloads, acknowledged responses, and more Implement modern secure VPNs with Cisco IOS and IOS-XE Plan and deploy IKEv2 in diverse real-world environments Configure IKEv2 proposals, policies, profiles, keyrings, and authorization Use advanced IKEv2 features, including SGT transportation and IKEv2 fragmentation Understand FlexVPN, its tunnel interface types, and IOS AAA infrastructure Implement FlexVPN Server with EAP authentication, pre-shared keys, and digital signatures Deploy, configure, and customize FlexVPN clients Configure, manage, and troubleshoot the FlexVPN Load Balancer Improve FlexVPN resiliency with dynamic tunnel source, backup peers, and backup tunnels Monitor IPsec VPNs with AAA, SNMP, and Syslog Troubleshoot connectivity, tunnel creation, authentication, authorization, data encapsulation, data encryption, and overlay routing Calculate IPsec overhead and fragmentation Plan your IKEv2 migration: hardware, VPN technologies, routing, restrictions, capacity, PKI, authentication, availability, and more

Comparing, Designing, and Deploying VPNs

Author: Mark Lewis (CCIE.)

Publisher: Adobe Press

ISBN:

Category: Computers

Page: 1043

View: 679

A detailed guide for deploying PPTP, L2TPv2, L2TPv3, MPLS Layer-3, AToM, VPLS and IPSec virtual private networks.

Network Security Assessment

Know Your Network

Author: Chris McNab

Publisher: "O'Reilly Media, Inc."

ISBN:

Category: Computers

Page: 508

View: 618

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack. Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. By grouping threats in this way, you learn to create defensive strategies against entire attack categories, providing protection now and into the future. Network Security Assessment helps you assess: Web services, including Microsoft IIS, Apache, Tomcat, and subsystems such as OpenSSL, Microsoft FrontPage, and Outlook Web Access (OWA) Web application technologies, including ASP, JSP, PHP, middleware, and backend databases such as MySQL, Oracle, and Microsoft SQL Server Microsoft Windows networking components, including RPC, NetBIOS, and CIFS services SMTP, POP3, and IMAP email services IP services that provide secure inbound network access, including IPsec, Microsoft PPTP, and SSL VPNs Unix RPC services on Linux, Solaris, IRIX, and other platforms Various types of application-level vulnerabilities that hacker tools and scripts exploit Assessment is the first step any organization should take to start managing information risks correctly. With techniques to identify and assess risks in line with CESG CHECK and NSA IAM government standards, Network Security Assessment gives you a precise method to do just that.

VPNs

A Beginner's Guide

Author: John Mairs

Publisher: McGraw-Hill Osborne Media

ISBN:

Category: Computers

Page: 584

View: 534

Ideal for connecting branch offices and remote workers, Virtual Private Networks (VPNs) provide a cost-effective, secure method for connecting to a network. This book is a step-by-step guide to deploying one of the fastest growing methods for remote access, global connections, and extranet connectivity. From understanding VPN technology to security features of VPN to actual implementations, this book covers it all.

CCSP: Secure PIX and Secure VPN Study Guide

Exams 642-521 and 642-511

Author: Wade Edwards

Publisher: Sybex

ISBN:

Category: Computers

Page: 525

View: 184

Here's the book you need to prepare for Cisco's Secure PIX Firewall (CSPFA) and Secure VPN (CSVPN) exams. This two-in-one Study Guide provides: In-depth coverage of all exam topics Practical information on implementing Cisco's Secure PIX and Secure VPN technologies Hundreds of challenging review questions Leading-edge exam preparation software, including a test engine and electronic flashcards Authoritative coverage of all exam objectives, including: Secure PIX Firewall: Translations and Connections Access Control Lists and Content Filtering Object Grouping Advanced Protocol Handling Attack Guards, Intrusion Detection, and Shunning Authentication, Authorization, and Accounting Failover Cisco PIX Device Manager Enterprise PIX Firewall Management and Maintenance Firewall Services Module Secure VPN: VPN and IPSec Technology Overview VPN 3000 Concentrator Series Hardware Remote Access with Pre-shared Keys and Digital Certificates IPSec Software Client Firewalls Software Client Auto-Initiation Hardware Client Configuration Network Client Backup and Load Balancing Software Auto-Update Configuring for the IPSec Over UDP and IPSec Over TCP\ LAN-to-LAN with Pre-Shared Keys, NAT, and Digital Certificates Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Network World

Author:

Publisher:

ISBN:

Category:

Page: 60

View: 784

For more than 20 years, Network World has been the premier provider of information, intelligence and insight for network and IT executives responsible for the digital nervous systems of large organizations. Readers are responsible for designing, implementing and managing the voice, data and video systems their companies use to support everything from business critical applications to employee collaboration and electronic commerce.

IPSec VPN Design

Author: Vijay Bollapragada

Publisher: Cisco Press

ISBN:

Category: Computers

Page:

View: 129

The definitive design and deployment guide for secure virtual private networks Learn about IPSec protocols and Cisco IOS IPSec packet processing Understand the differences between IPSec tunnel mode and transport mode Evaluate the IPSec features that improve VPN scalability and fault tolerance, such as dead peer detection and control plane keepalives Overcome the challenges of working with NAT and PMTUD Explore IPSec remote-access features, including extended authentication, mode-configuration, and digital certificates Examine the pros and cons of various IPSec connection models such as native IPSec, GRE, and remote access Apply fault tolerance methods to IPSec VPN designs Employ mechanisms to alleviate the configuration complexity of a large- scale IPSec VPN, including Tunnel End-Point Discovery (TED) and Dynamic Multipoint VPNs (DMVPN) Add services to IPSec VPNs, including voice and multicast Understand how network-based VPNs operate and how to integrate IPSec VPNs with MPLS VPNs Among the many functions that networking technologies permit is the ability for organizations to easily and securely communicate with branch offices, mobile users, telecommuters, and business partners. Such connectivity is now vital to maintaining a competitive level of business productivity. Although several technologies exist that can enable interconnectivity among business sites, Internet-based virtual private networks (VPNs) have evolved as the most effective means to link corporate network resources to remote employees, offices, and mobile workers. VPNs provide productivity enhancements, efficient and convenient remote access to network resources, site-to-site connectivity, a high level of security, and tremendous cost savings. IPSec VPN Design is the first book to present a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. Divided into three parts, the book provides a solid understanding of design and architectural issues of large-scale, secure VPN solutions. Part I includes a comprehensive introduction to the general architecture of IPSec, including its protocols and Cisco IOS® IPSec implementation details. Part II examines IPSec VPN design principles covering hub-and-spoke, full-mesh, and fault-tolerant designs. This part of the book also covers dynamic configuration models used to simplify IPSec VPN designs. Part III addresses design issues in adding services to an IPSec VPN such as voice and multicast. This part of the book also shows you how to effectively integrate IPSec VPNs with MPLS VPNs. IPSec VPN Design provides you with the field-tested design and configuration advice to help you deploy an effective and secure VPN solution in any environment. This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Openvpn

Building and Integrating Virtual Private Networks

Author: Markus Feilner

Publisher: Packt Publishing Ltd

ISBN:

Category: Computers

Page: 258

View: 700

Learn how to build secure VPNs using this powerful Open Source application.

Tunneling Protocols

Multiprotocol Label Switching, Ipsec, Teredo Tunneling, Secure Sockets Layer Virtual Private Network

Author: Source Wikipedia

Publisher: Books LLC, Wiki Series

ISBN:

Category:

Page: 140

View: 235

Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 30. Chapters: Multiprotocol Label Switching, IPsec, Teredo tunneling, Point-to-Point Protocol over Ethernet, OpenVPN, Layer 2 Tunneling Protocol, SSL-Explorer: Community Edition, Generic Routing Encapsulation, Point-to-Point Tunneling Protocol, MPLS-TP, List of IPv6 tunnel brokers, HTTP tunnel, T-MPLS, Secure Socket Tunneling Protocol, AICCU, UT-VPN, Anything In Anything, Cisco Systems VPN Client, 6in4, IP tunnel, Cloudvpn, NAT-T, Point-to-Point Protocol over ATM, ICMP tunnel, Tunnel Setup Protocol, Data-Link Switching, Router alert label, RASPPPoE, 4in6, Shiva Smart Tunneling, PPPoX. Excerpt: Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. IPsec is an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite. It can be used in protecting data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host). Some other Internet security systems in widespread use, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS) and Secure Shell (SSH), operate in the upper layers of the TCP/IP model. Hence, IPsec protects any application traffic across an IP network. Applications do not need to be specifically designed to use IPsec. The use of TLS/SSL, on the other hand, must be designed into an application to protect the application protocols. IPsec is a successor of the ISO standard Network Layer Security Protocol (NLSP). NLSP was based on the SP3 protocol that was published by NIST, but...

Virtual Private Networks

Author: Charlie Scott

Publisher: "O'Reilly Media, Inc."

ISBN:

Category: Computers

Page: 211

View: 841

This book tells you how to plan and build a virtual private network, a collection of technologies that creates secure connections or "tunnels" over regular Internet lines. It starts with general concerns like costs and configuration and continues with detailed descriptions of how to install and use useful technologies that are available for Windows NT and UNIX, such as PPTP, the Altavista Tunnel, and the Cisco PIX Firewall.

Network Security Principles and Practices

Author: Saadat Malik

Publisher: Cisco Press

ISBN:

Category: Computers

Page: 774

View: 986

Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. Lack of customer, partner, and employee access to e-commerce and data servers can impact both revenue and productivity. Even so, most networks do not have the proper degree of security. Network Security Principles and Practices provides an in-depth understanding of the policies, products, and expertise that brings organization to this extremely complex topic and boosts your confidence in the performance and integrity of your network systems and services. Written by the CCIE engineer who wrote the CCIE Security lab exam and who helped develop the CCIE Security written exam, Network Security Principles and Practices is the first book to help prepare candidates for the CCIE Security exams. Network Security Principles and Practices is a comprehensive guide to network security threats and the policies and tools developed specifically to combat those threats. Taking a practical, applied approach to building security into networks, the book shows you how to build secure network architectures from the ground up. Security aspects of routing protocols, Layer 2 threats, and switch security features are all analyzed. A comprehensive treatment of VPNs and IPSec is presented in extensive packet-by-packet detail. The book takes a behind-the-scenes look at how the Cisco PIX(r) Firewall actually works, presenting many difficult-to-understand and new Cisco PIX Firewall and Cisco IOS(r) Firewall concepts. The book launches into a discussion of intrusion detection systems (IDS) by analyzing and breaking down modern-day network attacks, describing how an IDS deals with those threats in general, and elaborating on the Cisco implementation of IDS. The book also discusses AAA, RADIUS, and TACACS+ and their usage with some of the newer security implementations such as VPNs and proxy authentication. A complete section devoted to service provider techniques for enhancing customer security and providing support in the event of an attack is also included. Finally, the book concludes with a section dedicated to discussing tried-and-tested troubleshooting tools and techniques that are not only invaluable to candidates working toward their CCIE Security lab exam but also to the security network administrator running the operations of a network on a daily basis.

SSL Remote Access VPNs (Network Security)

Author: Qiang Huang

Publisher: Cisco Press

ISBN:

Category: Computers

Page: 384

View: 346

SSL Remote Access VPNs An introduction to designing and configuring SSL virtual private networks Jazib Frahim, CCIE® No. 5459 Qiang Huang, CCIE No. 4937 Cisco® SSL VPN solutions (formerly known as Cisco WebVPN solutions) give you a flexible and secure way to extend networking resources to virtually any remote user with access to the Internet and a web browser. Remote access based on SSL VPN delivers secure access to network resources by establishing an encrypted tunnel across the Internet using a broadband (cable or DSL) or ISP dialup connection. SSL Remote Access VPNs provides you with a basic working knowledge of SSL virtual private networks on Cisco SSL VPN-capable devices. Design guidance is provided to assist you in implementing SSL VPN in existing network infrastructures. This includes examining existing hardware and software to determine whether they are SSL VPN capable, providing design recommendations, and guiding you on setting up the Cisco SSL VPN devices. Common deployment scenarios are covered to assist you in deploying an SSL VPN in your network. SSL Remote Access VPNs gives you everything you need to know to understand, design, install, configure, and troubleshoot all the components that make up an effective, secure SSL VPN solution. Jazib Frahim, CCIE® No. 5459, is currently working as a technical leader in the Worldwide Security Services Practice of the Cisco Advanced Services for Network Security. He is responsible for guiding customers in the design and implementation of their networks, with a focus on network security. He holds two CCIEs, one in routing and switching and the other in security. Qiang Huang, CCIE No. 4937, is a product manager in the Cisco Campus Switch System Technology Group, focusing on driving the security and intelligent services roadmap for market-leading modular Ethernet switching platforms. During his time at Cisco, Qiang has played an important role in a number of technology groups, including the Cisco TAC security and VPN team, where he was responsible for trouble-shooting complicated customer deployments in security and VPN solutions. Qiang has extensive knowledge of security and VPN technologies and experience in real-life customer deployments. Qiang holds CCIE certifications in routing and switching, security, and ISP Dial. Understand remote access VPN technologies, such as Point-to-Point Tunneling Protocol (PPTP), Internet Protocol Security (IPsec), Layer 2 Forwarding (L2F), Layer 2 Tunneling (L2TP) over IPsec, and SSL VPN Learn about the building blocks of SSL VPN, including cryptographic algorithms and SSL and Transport Layer Security (TLS) Evaluate common design best practices for planning and designing an SSL VPN solution Gain insight into SSL VPN functionality on Cisco Adaptive Security Appliance (ASA) and Cisco IOS® routers Install and configure SSL VPNs on Cisco ASA and Cisco IOS routers Manage your SSL VPN deployment using Cisco Security Manager This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security Covers: SSL VPNs

MPLS VPN Security

Author: Michael H. Behringer

Publisher: Cisco Systems

ISBN:

Category: Computers

Page: 286

View: 799

The definitive guide to understanding MPLS security and implementing and operating secure MPLS networks.

Best Books