IPSec VPN Design
Home > Computing and Information Technology > Computer security > Privacy and data protection > IPSec VPN Design
IPSec VPN Design

IPSec VPN Design


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The definitive design and deployment guide for secure virtual private networks Learn about IPSec protocols and Cisco IOS IPSec packet processing Understand the differences between IPSec tunnel mode and transport mode Evaluate the IPSec features that improve VPN scalability and fault tolerance, such as dead peer detection and control plane keepalives Overcome the challenges of working with NAT and PMTUD Explore IPSec remote-access features, including extended authentication, mode-configuration, and digital certificates Examine the pros and cons of various IPSec connection models such as native IPSec, GRE, and remote access Apply fault tolerance methods to IPSec VPN designs Employ mechanisms to alleviate the configuration complexity of a large- scale IPSec VPN, including Tunnel End-Point Discovery (TED) and Dynamic Multipoint VPNs (DMVPN) Add services to IPSec VPNs, including voice and multicast Understand how network-based VPNs operate and how to integrate IPSec VPNs with MPLS VPNs Among the many functions that networking technologies permit is the ability for organizations to easily and securely communicate with branch offices, mobile users, telecommuters, and business partners. Such connectivity is now vital to maintaining a competitive level of business productivity. Although several technologies exist that can enable interconnectivity among business sites, Internet-based virtual private networks (VPNs) have evolved as the most effective means to link corporate network resources to remote employees, offices, and mobile workers. VPNs provide productivity enhancements, efficient and convenient remote access to network resources, site-to-site connectivity, a high level of security, and tremendous cost savings.   IPSec VPN Design is the first book to present a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. Divided into three parts, the book provides a solid understanding of design and architectural issues of large-scale, secure VPN solutions. Part I includes a comprehensive introduction to the general architecture of IPSec, including its protocols and Cisco IOS® IPSec implementation details. Part II examines IPSec VPN design principles covering hub-and-spoke, full-mesh, and fault-tolerant designs. This part of the book also covers dynamic configuration models used to simplify IPSec VPN designs. Part III addresses design issues in adding services to an IPSec VPN such as voice and multicast. This part of the book also shows you how to effectively integrate IPSec VPNs with MPLS VPNs.   IPSec VPN Design provides you with the field-tested design and configuration advice to help you deploy an effective and secure VPN solution in any environment.   This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Table of Contents:
Introduction Chapter 1      Introduction to VPNs    Motivations for Deploying a VPN           VPN Technologies       Layer 2 VPNs          Layer 3 VPNs          Remote Access VPNs         Summary         Chapter 2      IPSec Overview   Encryption Terminology            Symmetric Algorithms    Asymmetric Algorithms        Digital Signatures     IPSec Security Protocols          IPSec Transport Mode    IPSec Tunnel Mode Encapsulating Security Header (ESP)           Authentication Header (AH)   Key Management and Security Associations      The Diffie-Hellman Key Exchange     Security Associations and IKE Operation      IKE Phase 1 Operation    IKE Phase 2 Operation    IPSec Packet Processing    Summary         Chapter 3      Enhanced IPSec Features   IKE Keepalives            Dead Peer Detection    Idle Timeout     Reverse Route Injection     RRI and HSRP    Stateful Failover     SADB Transfer    SADB Synchronization  IPSec and Fragmentation   IPSec and PMTUD        Look Ahead Fragmentation       GRE and IPSec     IPSec and NAT      Effect of NAT on AH      Effect of NAT on ESP    Effect of NAT on IKE     IPSec and NAT Solutions          Summary  Chapter 4      IPSec Authentication and Authorization Models    Extended Authentication (XAUTH) and Mode Configuration (MODE-CFG)      Mode-Configuration (MODECFG)    Easy VPN (EzVPN)           EzVPN Client Mode      Network Extension Mode          Digital Certificates for IPSec VPNs  Digital Certificates         Certificate Authority–Enrollment            Certificate Revocation   Summary  Chapter 5      IPSec VPN Architectures   IPSec VPN Connection Models       IPSec Model   The GRE Model            The Remote Access Client Model         IPSec Connection Model Summary       Hub-and-Spoke Architecture          Using the IPSec Model Transit Spoke-to-Spoke Connectivity Using IPSec          Internet Connectivity Scalability Using the IPSec Connection Model          GRE Model Transit Site-to-Site Connectivity      Transit Site-to-Site Connectivity with Internet Access           Scalability of GRE Hub-and-Spoke Models            Remote Access Client Connection Model     Easy VPN (EzVPN) Client Mode   EzVPN Network Extension Mode  Scalability of Client Connectivity Models       Full-Mesh Architectures Native IPSec Connectivity Model      GRE Model Summary         Chapter 6      Designing Fault-Tolerant IPSec VPNs    Link Fault Tolerance      Backbone Network Fault Tolerance   Access Link Fault Tolerance Access Link Fault Tolerance Summary          IPSec Peer Redundancy    Simple Peer Redundancy Model      Virtual IPSec Peer Redundancy Using HSRP            IPSec Stateful Failover    Peer Redundancy Using GRE          Virtual IPSec Peer Redundancy Using SLB   Server Load Balancing Concepts     IPSec Peer Redundancy Using SLB      Cisco VPN 3000 Clustering for Peer Redundancy      Peer Redundancy Summary Intra-Chassis IPSec VPN Services Redundancy Stateless IPSec Redundancy           Stateful IPSec Redundancy  Summary         Chapter 7      Auto-Configuration Architectures for Site-to-Site IPSec VPNs    IPSec Tunnel Endpoint Discovery  Principles of TED          Limitations with TED      TED Configuration and State      TED Fault Tolerance      Dynamic Multipoint VPN     Multipoint GRE Interfaces          Next Hop Resolution Protocol   Dynamic IPSec Proxy Instantiation         Establishing a Dynamic Multipoint VPN  DMVPN Architectural Redundancy         DMVPN Model Summary          Summary  Chapter 8      IPSec and Application Interoperability   QoS-Enabled IPSec VPNs Overview of IP QoS Mechanisms          IPSec Implications for Classification       IPSec Implications on QoS Policies       VoIP Application Requirements for IPSec VPN Networks     Delay Implications         Jitter Implications          Loss Implications          IPSec VPN Architectural Considerations for VoIP    Decoupled VoIP and Data Architectures VoIP over IPSec Remote Access          VoIP over IPSec-Protected GRE Architectures   VoIP Hub-and-Spoke Architecture         VoIP over DMVPN Architecture VoIP Traffic Engineering Summary         Multicast over IPSec VPNs       Multicast over IPSec-protected GRE Multicast on Full-Mesh Point-to-Point GRE/IPSec Tunnels      DMVPN and Multicast           Multicast Group Security       Multicast Encryption Summary          Summary         Chapter 9      Network-Based IPSec VPNs   Fundamentals of Network-Based VPNs  The Network-Based IPSec Solution: IOS Features          The Virtual Routing and Forwarding Table      Crypto Keyrings       ISAKMP Profiles      Operation of Network-Based IPSec VPNs          A Single IP Address on the PE        Front-Door and Inside VRF   Configuration and Packet Flow          Termination of IPSec on a Unique IP Address Per VRF         Network-Based VPN Deployment Scenarios      IPSec to MPLS VPN over GRE        IPSec to L2 VPNs    PE-PE Encryption    Summary         Index     

About the Author :
Vijay Bollapragada, CCIE® No. 1606, is a senior manager in the Network Systems Integration and Test Engineering group at Cisco Systems® where he works on the architecture, design, and validation of complex network solutions.   Mohamed Khalid, CCIE No. 2435, is a technical leader working with IP VPN solutions at Cisco®. He works extensively with service providers across the globe and their associated Cisco account teams to determine technical and engineering requirements for various IP VPN architectures.   Scott Wainner is a Distinguished Systems Engineer in the U.S. Service Provider Sales Organization at Cisco Systems where he focuses on VPN architecture and solution development. In this capacity, he provides customer guidance on IP VPN architectures and drives internal development initiatives within Cisco Systems.


Best Sellers


Product Details
  • ISBN-13: 9780134384160
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • ISBN-10: 0134384164
  • Publisher Date: 29 Mar 2005
  • Binding: Digital download
  • No of Pages: 384


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
IPSec VPN Design
Pearson Education (US) -
IPSec VPN Design
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

IPSec VPN Design

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!