享·阅读
图书信息:
0次推荐
3次浏览
0次下载
书名: Virtual Private Networking : A Construction, Operation and Utilization Guide
作者: Held, Gilbert
出版时间: 2005-01-28
ISBN: 9780470854327(P-ISBN) ,9780470020333(O-ISBN)
摘要:
摘要:
书目详情:
virtual private networkingcontentsPrefaceAcknowledgementsChapter 1 Introduction to Virtual Private Networking1.1 THE VPN CONCEPT1.1.1 DEFINITION1.1.2 TYPES OF VPNS1.1.3 CATEGORIES OF VPNS1.1.4 INFRASTRUCTURE1.1.5 BENEFITS OF USE1.1.6 DISADVANTAGES OF VPNS1.1.7 VPN PROTOCOLS1.1.8 SUMMARY1.1.9 ALTERNATIVES TO VPNS1.1.10 ECONOMIC ISSUES1.1.11 OTHER ALTERNATIVES1.2 BOOK PREVIEW1.2.1 UNDERSTANDING AUTHENTICATION AND CRYPTOLOGY1.2.2 UNDERSTANDING THE TCP/IP PROTOCOL SUITE1.2.3 LAYER 2 VPN TECHNIQUES1.2.4 HIGHER LAYER VPNS1.2.5 VPN HARDWARE AND SOFTWARE1.2.6 SERVICE PROVIDER-BASED VPNSChapter 2 Understanding Authentication and Encryption2.1 AUTHENTICATION2.1.1 PASSWORD AUTHENTICATION PROTOCOL2.1.2 CHALLENGE-HANDSHAKE AUTHENTICATION PROTOCOL2.1.3 EXTENSIBLE AUTHENTICATION PROTOCOL – TRANSPORT LEVEL SECURITY2.1.4 TOKEN AUTHENTICATION2.2 ENCRYPTION2.2.1 GENERAL METHOD OF OPERATION2.2.2 PRIVATE VERSUS PUBLIC KEY SYSTEMS2.2.3 PUBLIC KEY ENCRYPTION2.2.4 THE RSA ALGORITHM2.2.5 DIGITAL CERTIFICATES2.2.6 HASHING AND DIGITAL SIGNATURESChapter 3 Understanding the TCP/IP Protocol Suite3.1 FRAME FORMATION3.1.1 HEADER SEQUENCING3.1.2 SEGMENTS AND DATAGRAMS3.1.3 ICMP MESSAGES3.1.4 ON THE LAN3.1.5 DATAFLOW CONTROL FIELDS3.2 THE NETWORK LAYER3.2.1 THE IPV4 HEADER3.2.2 SUBNETTING3.2.3 THE SUBNET MASK3.2.4 THE WILDCARD MASK3.2.5 ICMP3.3 THE TRANSPORT LAYER3.3.1 TRANSPORT LAYER PROTOCOLS3.3.2 THE TCP HEADER3.3.3 THE UDP HEADER3.3.4 SOURCE AND DESTINATION PORT FIELDS3.4 PROXY SERVICES AND NETWORK ADDRESS TRANSLATION3.4.1 PROXY SERVICE3.4.2 NETWORK ADDRESS TRANSLATION3.4.3 TYPES OF ADDRESS TRANSLATION3.4.4 VPN CONSIDERATIONSChapter 4 Layer 2 Operations4.1 THE POINT-TO-POINT PROTOCOL4.1.1 COMPONENTS4.1.2 PPP ENCAPSULATION4.1.3 LINK CONTROL PROTOCOL OPERATIONS4.1.4 MULTILINK PPP4.2 POINT-TO-POINT TUNNELING PROTOCOL4.2.1 IMPLEMENTATION MODELS4.2.2 NETWORKING FUNCTIONS4.2.3 ESTABLISHING THE PPTP TUNNEL4.2.4 PPTP ENCAPSULATED PACKETS4.2.5 THE PPTP CONTROL CONNECTION PACKET4.2.6 CONTROL CONNECTION PROTOCOL OPERATION4.2.7 PPTP DATA TUNNELING4.3 LAYER TWO FORWARDING4.3.1 EVOLUTION4.3.2 OPERATION4.3.3 THE L2F PACKET FORMAT4.3.4 TUNNEL OPERATIONS4.3.5 MANAGEMENT MESSAGES4.4 LAYER TWO TUNNELING PROTOCOL4.4.1 OVERVIEW4.4.2 ARCHITECTURAL MODELS4.4.3 THE L2TP PACKET FORMAT4.4.4 CONTROL MESSAGES4.4.5 PROTOCOL OPERATIONSChapter 5 Higher Layer VPNs5.1 UNDERSTANDING IPSEC5.1.1 OVERVIEW5.1.2 TOPOLOGIES SUPPORTED5.1.3 SPECIFYING SESSION PARAMETERS5.1.4 THE SPI5.1.5 PROTOCOLS5.1.6 AUTHENTICATION HEADER5.1.7 ENCAPSULATING SECURITY PAYLOAD5.1.8 OPERATIONS5.1.9 KEY MANAGEMENT5.2 WORKING WITH IPSEC5.2.1 CONFIGURING IPSEC POLICIES5.2.2 ADDING THE IPSEC SNAP-IN5.2.3 CREATING AN IPSEC POLICY5.2.4 WORKING WITH IPSEC FILTERS5.3 SSL AND TLS5.3.1 RATIONALE FOR SSL5.3.2 OVERVIEW OF SSL5.3.3 SSL OPERATION5.3.4 MESSAGE EXCHANGE5.3.5 CIPHER SUITES5.3.6 THE NETILLA SECURITY PLATFORM5.3.7 SUMMARYChapter 6 VPN Hardware and Software6.1 USING THE ASANTE VPN SECURITY ROUTER6.1.1 OVERVIEW6.1.2 CONFIGURATION ACCESS6.1.3 WIRELESS CONSIDERATIONS6.1.4 VPN OPERATIONS6.1.5 CLIENT-TO-NETWORK6.2 WINDOWS VPN SOFTWARE6.2.1 USING A WINDOWS XP CLIENT6.2.2 CREATING THE VPN6.3 WORKING WITH WINDOWS 2000 SERVER6.3.1 INSTALLING RRAS6.3.2 ENABLING RRAS6.3.3 CONFIGURING RRAS6.3.4 CREATING A TEST ACCOUNT6.3.5 TESTING THE CONNECTIONChapter 7 Service Provider-Based VPNs7.1 RATIONALE FOR USE7.1.1 ECONOMICS7.1.2 PERSONNEL LIMITATIONS7.1.3 RELIABILITY7.1.4 COMMUNICATIONS UNITY7.1.5 MANAGEMENT7.1.6 INSTALLATION AND SUPPORT7.1.7 PACKAGED SECURITY7.2 TRANSPORT FACILITIES AND VPN OPERATION7.2.1 HARDWARE-BASED SWITCHING7.2.2 SOFTWARE-BASED SWITCHING7.3 SERVICE LEVEL AGREEMENTS7.3.1 SLA METRICS7.3.2 SLA LIMITATIONS7.4 VPN SERVICE PROVIDER OVERVIEW7.4.1 AT&T; CORPORATION7.4.2 LEVEL 3 COMMUNICATIONS7.4.3 SPRINT7.4.4 VERIZONAppendix A VPN ChecklistIndex
评论:
南京大学志愿者
点击向他求书按钮,直接QQ联系图书馆志愿者。
南京大学
计算机科学与技术
他下载过此书,你可以像他求助 他下载过《这本电子书》,你可以向他求助

求书成功!

提示
您的信息不完善,将无法进行求书,点击确定完善个人信息!
footer
提示: 请按照要求填写内容
提示
您将删除与此条信息有关的所有信息!!!