Virtual Private Networks
Seiten
1998
O'Reilly Media (Verlag)
978-1-56592-319-5 (ISBN)
O'Reilly Media (Verlag)
978-1-56592-319-5 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
Zu diesem Artikel existiert eine Nachauflage
This book tells you how to plan and build a virtual private network, a collection of technologies that creates secure connections or "tunnels" over regular Internet lines. Written by Internet Service Providers who offer VPNs to their customers and thoroughly know the technology.
Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?The solution is a Virtual Private Network (VPN): a collection of technologies that creates secure connections or "tunnels" over regular Internet lines -- connections that can be easily used by anyone logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and UNIX.Topics include: How the VPN compares to other available networking technologiesEncryption, firewalls, and other technologies that let VPNs workVPN configuration (sample included)Point to Point Tunneling Protocol (PPTP) and Level 2 Tunneling Protocol (L2TP)The AltaVista TunnelThe Cisco PIX FirewallMaintenance and trouble-shootingUpcoming technologies like IPsec and S/WAN
Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?The solution is a Virtual Private Network (VPN): a collection of technologies that creates secure connections or "tunnels" over regular Internet lines -- connections that can be easily used by anyone logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and UNIX.Topics include: How the VPN compares to other available networking technologiesEncryption, firewalls, and other technologies that let VPNs workVPN configuration (sample included)Point to Point Tunneling Protocol (PPTP) and Level 2 Tunneling Protocol (L2TP)The AltaVista TunnelThe Cisco PIX FirewallMaintenance and trouble-shootingUpcoming technologies like IPsec and S/WAN
Erscheint lt. Verlag | 7.4.1998 |
---|---|
Zusatzinfo | Illustrations |
Verlagsort | Sebastopol |
Sprache | englisch |
Maße | 178 x 229 mm |
Gewicht | 390 g |
Einbandart | kartoniert |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-56592-319-7 / 1565923197 |
ISBN-13 | 978-1-56592-319-5 / 9781565923195 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
34,99 €