注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络网络与数据通信网络组建与管理构建虚拟专用网

构建虚拟专用网

构建虚拟专用网

定 价:¥38.00

作 者: (美)Steven Brown编著
出版社: 人民邮电出版社
丛编项: 网络与通信技术影印版系列
标 签: 暂缺

购买这本书可以去


ISBN: 9787115087843 出版时间: 2000-01-01 包装:
开本: 21cm 页数: 594 字数:  

内容简介

  本书为用户提供了切实可行的虚拟专用网(VPN)的解决方案,将帮助读者逐步地理解、构建、集成和管理VPN中的诸多成分,如加密、认证业务、密钥长度和保密性等。更为重要的是,本书把网络的防护和安全提升到了一个新的高度。为了成功地构建VPN,并且在VPN建立后对其进行维护、解决其存在的疑难问题,本书向读者提供:●VPN技术和体系结构的详细说明●为不同的需求选择合适的体系结构和拓扑结构●不同VPN技术的成本比较,并建立了一个可以进行成本效益分析的模型●维护VPN和解决VPN疑难问题完全导引,包括作者经常碰到的一些问题●在面对现在和将来的安全威胁时,要占领制高点不可或缺的指南不管读者是正在考虑为公司建立VPN的经理或是设计和安装系统的工程师,或是监测系统性能、安全性和可靠性的管理员,本书都会对您有极大的帮助,能够为您提供详尽、丰富的信息和有价值的参考。

作者简介

暂缺《构建虚拟专用网》作者简介

图书目录

PART1 THE FOUNDATIONS OF VPNs
Chapter1 Introduction to VPN Technology
What Is a VPN?
Components That Make Up a VPN
Who Supports VPNs?
The Growth of VPNs
Identifying a Need for VPN
The Business Need for VPNs
How to Choose VPN Services
Conclusion
Chapter2 Network Secrity for VPNs
What Is Network Security?
What Can You Do to Protect Against Threats?
How to Identify Attacks
What Are Some Security Requirements of VPNs?
Why Is Security So Important when Implementing VPNs?
Implementing a Good Security Policy
Is Your Organization vuinerable to Attacks?
What Are Some Types of Attacks?
Conclusion
Chapter3 The Advatages and Disdvantages of VPN Technology
VPN Benefits
Cost Savings of VPNs
Benefits of Network Design
End-User Benefits of VPNs
Benefits of a Global Reach
Benefits to ISPs
Competitive Advatage of VPNs
Cost of VPN Technology
Additional Telecommunication costs
Quality of Service guarantees
Service Level Agreements
Conclusion
Chapter4 VPN Architecture
Introduction to Architecture
Which Is the Best VPN for You?
VPN Supplied by Network Servcie Provider
Firewall-Based VPNs
Black-Based VPNs
router-Based VPNs
Remote Access-Based VPNs
Application-Applications with VPNs
Software-Based VPNs
Tunnel Switches for VPNs
Performance Statistics/Comparisons-
certification/Compliance
Conclusion
Chapter5 Topologies of VPNs
Introduction to VPN Topology
Firewall/VPN-to-Client Topology
VPN/LAN-to-LAN Topology
VPN/Firewall-to-Intranec/Extranet Topology
VPN/ Frame of ATM Topology
Hardware(Black-Box)VPN Topology
VPN/NAT Topology
VPN Switch Topology
VPN Nested Tunnels
Load Balancing and Synchronization
Conclusion
Chapter6 Government Restrictions on VPN Technology
Introducton to the Politics of Encryption
What Role Does Government Play in VPN Technology?
Why Would the Government’s Policy Actions Affect VPN Security?
Where Do I Get Permission to Use Strong Security?
The Economic Cost of Government Intrusion
Legal Status of Encryption
International Impact on U.S.Government’s Encryption Policy
What’s Happening Today?
Conclusion
PART2 THE VPN IMPLENENTATION
Chapter7 The Basics
Decide on a Game Plan
VPN Architecture Placement
Routing Problems
Topology Palcement
IP/NAT Addressing concerns
Remote Access Issues
DNS/SMTP Issues
Conclusion
Chapter8 Installing a VPN,Part1
Introduction to Installing a Firewall-Based VPN
The Firewall-Based VPN Model
Obtain and Assign IP Address Space
Implementing a Good Security Policy
Implementing Management Traffic
Implementing SMTP and DNS Issues
Implementing Authentication
The Drop All Rule
Implementing the VPN Rule
Branch Office VPNs
Remote Users’VPNs
Conclusion
Chapter9 Installing a VPN,Part2
Service Provider VPN Services
Stand-alone VPN Services
Aventail ExtraNet Center
Compatible Systems-Access Servers
Nortel Networks-Extranet Switch 4000
Radguard-cIPro System
RedCreek-ravlin
Timestep-PERMIT Enterprise
VPNet-VPLink Architecture
Conclusion
Chapter10 Troubleshooting VPNs
Introduction to Troubleshooting VPNs
Remote Dial-In Users
LAN-to-LAN VPN
PPTP VPN
LZTP VPN
IPSec VPN
Multihoned Firewall/VPN
Conclusion
Chapter11 Maintaining a VPN
Introduction
Redundant Links
Growth in Your Organization
Software Updates
Onsite Technical Support
Telephone Support
Help Desk Support to Remote Users
VPNs,Build or Buy?
Compatibility Issues
Monitoring
Alerting
Logging 
Event Correlation
Encrption and Encapsulation
Key Management
Random-Number Generators
Certificates
Security Update
Support of Major Upgrade
Tunneling Protocols
Management Devices
Performance
Quality of Service
Authentication
Skilled Labor
conclusion
PART3 THE SECURITY OF VPNs
Chapter12 Cryptography
What Is Cryptography?
Private versus Public Key Cryptography
Block Ciphers
Stream Ciphers
Hash Functions
Message Authentication Codes
Digital Timestamps
Digital Signatures with Certificate Authorities
Strengths of cryptographic Hash Functions
Random-Number Generators
Clipper Chip
Which Cryptosystem Is Right for You?
Cryptography Timeline
Conclusion
Chapter13 Encrption
Private-Key Encryption
Public-Key Encryption
Shared Secret Key
Digital Signatures
Certificate Authorities(CAs)
Diffie-Hellman Public-Key Algorithm
RSA Public-Key Algorithm
Pretty Good Privacy(PGP)
Internet Security Protocol (IPSec)
Encapsulating Security Payload(ESP)PFC-2406
Public Key Infrastructure(PKI)
Layer 2 Forwarding Protocol(LZF)
Point-to-Point Tunneling Protocol(PPTP)
Layer 2 tunneling Protocol(L2TP)
Simple Key Internet Protocol(SKIP)
Secure Wide Area Network(S/WAN)
Conclusion
Chapter14 Secure Communication and Authentication
Authentication Protocols
Operating System Passwords
S/KEY
Remote Authentication Dial-In Service(RADIUS)
Terminal Access Controller Access Control System(TACACS/XTACACS)
Terminal Access Controller Access Control System Plus(TACACS+)
Kerberos
Certificates
Smart Cards
Hardware Tokens/PKCS#11
Lightweight Directory Access Protocol(LDAP)
ACE/Server with SecurID
Biometrics
Secure Modems
Conclusion
Chapter15 VPN Operating System Vulnerabilities
What Are VPN Operating System Vulnerabilities?
UNIX Guidelines
UNIX Operating System Vulnerabilities
Windows 95 Guidelines
Windows 95 Vulnerabilities
Windows NT Guidelines
Windows NT Vulnerabilities
Novell Guidelines
Conclusion
Chapter16 VPN Security Attacks
Introduction to VPN Attacks
Cryptographic Algorithms Attacks
Random-Number Generator(RNG)Attacks
Government Attacks via Key Pecovery
Internet Security(IPSec)Attacks
Point-To-Point tunneling Protocol(PPTP)Attacks
SKIP Attacks
Certificate Authorities Attacks
RADIUS Attacks
Kerberos Attacks
Pretty Good Privacy(PGP)Attacks
Denial of Service(DoS)Attacks
Other Attacks
Conclusion
Chapter17 Security Toolbelt
What Is a Security Toolbelt?
The Need for a Security Toolbelt
RFC 2196 Site Security Handbook
Security Escalation Procedures
Building a Secure Site
Security Tools
Incident Response Centers
Mailing Lists/Newsgroups
Web Security
Conclusion
chapter18 Intrusion Detection and Security Scanning
Introduction to Intrusion Detection
Categories of Intrusion Systems
Characteristics of a Good Intrusion Detection System
Intrusion Detection/footprint
Fooling an Intrusion detection System
Intrusion Detection Tools
Limiting Intrusion
Scanners
Conclusion
Chapter19 Emerging Technologies for VPNs
Introduction to Emerging Technologies
Advances in Computing
Advances in cryptographic Systems
Private Doorbell
Steganography
What Are the New Threats?
Government Regulations
Wireless VPNs
Conclusion
Appendix A:Links and References
Glossary
Index

本目录推荐