Search Books
The Complete Cisco VPN Conf… Penetration Testing and Net…

IPSec Virtual Private Network Fundamentals

Author James Henry Carmouche
Publisher Cisco Press
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
64.99 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $25.94
Share:
Book Details
PublisherCisco Press
ISBN / ASIN1587052075
ISBN-139781587052071
Sales Rank1,839,513
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

An introduction to designing and configuring Cisco IPsec VPNs

 

  • Understand the basics of the IPsec protocol and learn implementation best practices
  • Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace
  • Learn how to avoid common pitfalls related to IPsec deployment
  • Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutions

     

    IPsec Virtual Private Network Fundamentals provides a basic working knowledge of IPsec on various Cisco routing and switching platforms. It provides the foundation necessary to understand the different components of Cisco IPsec implementation and how it can be successfully implemented in a variety of network topologies and markets (service provider, enterprise, financial, government). This book views IPsec as an emerging requirement in most major vertical markets, explaining the need for increased information authentication, confidentiality, and non-repudiation for secure transmission of confidential data. The book is written using a layered approach, starting with basic explanations of why IPsec was developed and the types of organizations relying on IPsec to secure data transmissions. It then outlines the basic IPsec/ISAKMP fundamentals that were developed to meet demand for secure data transmission. The book covers the design and implementation of IPsec VPN architectures using an array of Cisco products, starting with basic concepts and proceeding to more advanced topics including high availability solutions and public key infrastructure (PKI). Sample topology diagrams and configuration examples are provided in each chapter to reinforce the fundamentals expressed in text and to assist readers in translating concepts into practical deployment scenarios. Additionally, comprehensive case studies are incorporated throughout to map topics to real-world solutions.

  • The Good Web Site Guide 2006: The Completely Revised, …
    View
    The Pentium Microprocessor
    View
    Advanced Intel Microprocessors: 80286, 80386, And 80486
    View
    Differential Equations: Matrices and Models
    View
    Digital Experiments: Emphasizing Troubleshooting (Merr…
    View
    Data Structures for Computer Information Systems
    View
    The Little LISPer, Third Edition
    View
    Inside Networks
    View
    Computer Graphics Using Open GL (2nd Edition)
    View