IPSec Virtual Private Network Fundamentals
Home > Computing and Information Technology > Computer security > Privacy and data protection > IPSec Virtual Private Network Fundamentals
IPSec Virtual Private Network Fundamentals

IPSec Virtual Private Network Fundamentals


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

An introduction to designing and configuring Cisco IPsec VPNs   Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutions   IPsec Virtual Private Network Fundamentals provides a basic working knowledge of IPsec on various Cisco routing and switching platforms. It provides the foundation necessary to understand the different components of Cisco IPsec implementation and how it can be successfully implemented in a variety of network topologies and markets (service provider, enterprise, financial, government). This book views IPsec as an emerging requirement in most major vertical markets, explaining the need for increased information authentication, confidentiality, and non-repudiation for secure transmission of confidential data. The book is written using a layered approach, starting with basic explanations of why IPsec was developed and the types of organizations relying on IPsec to secure data transmissions. It then outlines the basic IPsec/ISAKMP fundamentals that were developed to meet demand for secure data transmission. The book covers the design and implementation of IPsec VPN architectures using an array of Cisco products, starting with basic concepts and proceeding to more advanced topics including high availability solutions and public key infrastructure (PKI). Sample topology diagrams and configuration examples are provided in each chapter to reinforce the fundamentals expressed in text and to assist readers in translating concepts into practical deployment scenarios. Additionally, comprehensive case studies are incorporated throughout to map topics to real-world solutions.

Table of Contents:
Contents Introduction Part I   Introductory Concepts and Configuration/Troubleshooting Chapter 1        Introduction to VPN Technologies VPN Overview of Common Terms Characteristics of an Effective VPN VPN Technologies Virtual Private Dialup Networks   Multiprotocol Label Switching VPNs   IPsec VPNs   Transport Layer VPNs   Common VPN Deployments   Site-to-Site VPNs   Remote Access VPNs   Business Drivers for VPNs   Remote Access VPN Business Drivers–A Practical Example   Site-to-Site VPN Business Drivers–A Practical Example   IPsec VPNs and the Cisco Security Framework   Summary     Chapter 2        IPsec Fundamentals   Overview of Cryptographic Components   Asymmetric Encryption   Symmetric Encryption   Message Authentication, Message Integrity, and Sender Nonrepudiation Mechanisms   Public Key Encryption Methods   RSA Public-Key Technologies   Diffie-Hellman Key Exchange   The IP Security Protocol (IPsec)   IPsec Modes   IPsec Transforms   IPsec SA   IPsec Configuration Elements   Manual Keying   The Need for Security Association and Key Management   IKE and ISAKMP   IKE and ISAKMP Terminology and Background   IKE SA Negotiation and Maintenance   IPsec Diffie-Hellman Shared Secret Key Generation Using IKE   IKE Authentication Services   IKE Phase I Negotiation   IKE Phase II Negotiation   Configuring ISAKMP   IKE with RAVPN Extensions   Summary   Chapter 3        Basic IPsec VPN Topologies and Configurations   Site-to-Site IPsec VPN Deployments   Site-to-Site VPN Architectural Overview for a Dedicated Circuit   Site-to-Site Architectural Overview over a Routed Domain   Site-to-Site IPsec VPN Deployments and GRE (IPsec+GRE)   Site-to-Site IPsec+GRE Architectural Overview   Site-to-Site IPsec+GRE Sample Configurations   Hub-and-Spoke IPsec VPN Deployments   Hub-and-Spoke Architectural Overview   Standard Hub-and-Spoke Design without High Availability   Clustered Spoke Design to Redundant Hubs   Redundant Clustered Spoke Design to Redundant Hubs   Remote Access VPN Deployments   RAVPN Architectural Overview   RAVPN Clients   Standalone VPN Concentrator Designs   Clustered VPN Concentrator Designs   Summary     Chapter 4        Common IPsec VPN Issues   IPsec Diagnostic Tools within Cisco IOS   Common Configuration Issues with IPsec VPNs   IKE SA Proposal Mismatches   IKE Authentication Failures and Errors   IPsec SA Proposal Mismatches   Crypto-Protected Address Space Issues (Crypto ACL Errors)   Architectural and Design Issues with IPsec VPNs   Troubleshooting IPsec VPNs in Firewalled Environments   NAT Issues in IPsec VPN Designs   The Influence of IPsec on Traffic Flows Requiring QoS   Solving Fragmentation Issues in IPsec VPNs   The Effect of Recursive Routing on IPsec VPNs   Summary     Part II     Designing VPN Architectures   Chapter 5        Designing for High Availability   Network and Path Redundancy   IPSec Tunnel Termination Redundancy   Multiple Physical Interface HA with Highly Available Tunnel Termination Interfaces   Tunnel Termination HA Using HSRP/VRRP Virtual Interfaces   HA with Multiple Peer Statements   RP-based IPSec HA   Managing Peer and Path Availability   Peer Availability   Path Availability   Managing Path Symmetry   Load Balancing, Load Sharing, and High Availability   Load-Sharing with Peer Statements   Routing   Domain Name System (DNS)   Cisco VPN3000 Concentrator Clustering   IPSec Session Load-Balancing Using External Load Balancers   Summary     Chapter 6        Solutions for Local Site-to-Site High Availability   Using Multiple Crypto Interfaces for High Availability   Impact of Routing Protocol Reconvergence on IPsec Reconvergence   Impact of Stale SAs on IPsec Reconvergence   Impact of IPsec and ISAKMP SA Renegotiation on IPsec Reconvergence   Stateless IPsec VPN High-Availability Alternatives   Solution Overview for Stateless IPsec High Availability   Stateless High Availability Failover Process   Stateful IPsec VPN High-Availability Alternatives   Solution Overview for Stateful IPsec High Availability   Stateful High Availability Failover Process   Summary   Stateless IPsec VPN High Availability Design Summary   Stateful IPsec VPN High Availability Design Summary     Chapter 7        Solutions for Geographic Site-to-Site High Availability   Geographic IPsec VPN HA with Reverse Route Injection and Multiple IPsec Peers   Solution Overview for RRI with Multiple IPsec Peers   Geographic IPsec VPN High Availability with IPsec+GRE and Encrypted Routing Protocols   Solution Overview for IPsec+GRE with Encrypted Routing Protocols   Dynamic Multipoint Virtual Private Networks   DMVPN Solution Design Drivers   DMVPN Component-Level Overview and System Operation   Summary     Chapter 8        Handling Vendor Interoperability with High Availability   Vendor Interoperability Impact on Peer Availability   The Inability to Specify Multiple Peers   Lack of Peer Availability Mechanisms   Vendor Interoperability Impact on Path Availability   IPSec HA Design Considerations for Platforms with Limited Routing Protocol Support   IPSec HA Design Considerations for Lack of RRI Support   IPSec HA Design Considerations for Lack of Generic Routing Encapsulation (GRE) Support   Vendor Interoperability Design Considerations and Options   Phase 1 and 2 SA Lifetime Expiry   SADB Management with Quick Mode Delete Notify Messages   Invalid Security Parameter Index Recovery   Vendor Interoperability with Stateful IPSec HA   Summary     Chapter 9        Solutions for Remote-Access VPN High Availability   IPsec RAVPN Concentrator High Availability Using Virtual Interfaces for Tunnel Termination   IPsec RAVPN Concentrator High Availability Using VRRP   IPsec RAVPN Concentrator HA Using HSRP   IPsec RAVPN Concentrator HA Using the VCA Protocol   IPsec RAVPN Geographic HA Design Options   VPN Concentrator Session Load Balancing Using DNS   VPN Concentrator Redundancy Using Multiple Peers   Summary     Chapter 10      Further Architectural Options for IPsec   IPsec VPN Termination On-a-Stick   IPsec with Router-on-a-Stick Design Overview   Case Study: Small Branch IPsec VPN Tunnel Termination with NAT On-a-Stick   In-Path Versus Out-of-Path Encryption with IPsec   Out-of-Path Encryption Design Overview   Case Study: Firewalled Site-to-Site IPsec VPN Tunnel Termination   Separate Termination of IPsec and GRE (GRE-Offload)   GRE-Offload Design Overview   Case Study: Large-Scale IPsec VPN Tunnel Termination with GRE Offload   Summary     Part III     Advanced Topics   Chapter 11      Public Key Infrastructure and IPsec VPNs   PKI Background   PKI Components   Public Key Certificates   Registration Authorities   Certificate Revocation Lists and CRL Issuers   Certificate Authorities   PKI Cryptographic Endpoints   Life of a Public Key Certificate   RSA Signatures and X.509v3 Certificates   Generating Asymmetric Keypairs on Cryptographic Endpoints   Registration and Endpoint Authentication   Receipt and Authentication of the CA’s Certificate   Forwarding and Signing of Public Keys   Obtaining and Using Public Key Certificates   PKI and the IPSec Protocol Suite–Where PKI Fits into the IPSec model   OCSP and CRL Scalability   OCSP   Case Studies and Sample Configurations   Case Study 1: PKI Integration of Cryptographic Endpoints   Case Study 2: PKI with CA and RA   Case Study 3: PKI with Redundant CAs (CA Hierarchy)   Summary     Chapter 12      Solutions for Handling Dynamically Addressed Peers   Dynamic Crypto Maps   Dynamic Crypto Map Impact on VPN Behavior   Dynamic Crypto Map Configuration and Verification   Tunnel Endpoint Discovery   TED Configuration and Verification   Case Study–Using Dynamic Addressing with Low-Maintenance Small Home Office Deployments   Summary     Appendix A Resources   Books   RFCs   Web and Other Resources   Index    

About the Author :
James Henry Carmouche, CCIE No. 6085, currently works for Cisco Systems Enterprise Systems Engineering group in Research Triangle Park, North Carolina where he is responsible for building, validating, and evangelizing new and emerging security integration concepts in new network architectures and solution reference designs. Prior to joining ESE, Henry served as a technical marketing engineer in Cisco's Government Systems Unit in Research Triangle Park, NC, where he is responsible for bringing advanced security products to market, building technical marketing collateral and presentations, and designing new product introduction training for the GSU's newly introduced security platforms.


Best Sellers


Product Details
  • ISBN-13: 9781587052774
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • ISBN-10: 1587052776
  • Publisher Date: 19 Jul 2006
  • Binding: Digital download
  • No of Pages: 480


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
IPSec Virtual Private Network Fundamentals
Pearson Education (US) -
IPSec Virtual Private Network Fundamentals
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

IPSec Virtual Private Network Fundamentals

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!