IKEv2 IPsec Virtual Private Networks
Home > Computing and Information Technology > Computer networking and communications > Networking packages > IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS
IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS

IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

Create and manage highly-secure Ipsec VPNs with IKEv2 and Cisco FlexVPN The IKEv2 protocol significantly improves VPN security, and Cisco’s FlexVPN offers a unified paradigm and command line interface for taking full advantage of it. Simple and modular, FlexVPN relies extensively on tunnel interfaces while maximizing compatibility with legacy VPNs. Now, two Cisco network security experts offer a complete, easy-tounderstand, and practical introduction to IKEv2, modern IPsec VPNs, and FlexVPN. The authors explain each key concept, and then guide you through all facets of FlexVPN planning, deployment, migration, configuration, administration, troubleshooting, and optimization. You’ll discover how IKEv2 improves on IKEv1, master key IKEv2 features, and learn how to apply them with Cisco FlexVPN. IKEv2 IPsec Virtual Private Networks offers practical design examples for many common scenarios, addressing IPv4 and IPv6, servers, clients, NAT, pre-shared keys, resiliency, overhead, and more. If you’re a network engineer, architect, security specialist, or VPN administrator, you’ll find all the knowledge you need to protect your organization with IKEv2 and FlexVPN. Understand IKEv2 improvements: anti-DDoS cookies, configuration payloads, acknowledged responses, and more Implement modern secure VPNs with Cisco IOS and IOS-XE Plan and deploy IKEv2 in diverse real-world environments Configure IKEv2 proposals, policies, profiles, keyrings, and authorization Use advanced IKEv2 features, including SGT transportation and IKEv2 fragmentation Understand FlexVPN, its tunnel interface types, and IOS AAA infrastructure Implement FlexVPN Server with EAP authentication, pre-shared keys, and digital signatures Deploy, configure, and customize FlexVPN clients Configure, manage, and troubleshoot the FlexVPN Load Balancer Improve FlexVPN resiliency with dynamic tunnel source, backup peers, and backup tunnels Monitor IPsec VPNs with AAA, SNMP, and Syslog Troubleshoot connectivity, tunnel creation, authentication, authorization, data encapsulation, data encryption, and overlay routing Calculate IPsec overhead and fragmentation Plan your IKEv2 migration: hardware, VPN technologies, routing, restrictions, capacity, PKI, authentication, availability, and more

Table of Contents:
    Foreword xxvii      Introduction xxxiii  Part I Understanding IPsec VPNs  Chapter 1 Introduction to IPsec VPNs 1      The Need and Purpose of IPsec VPNs 2      Building Blocks of IPsec 2          Security Protocols 2          Security Associations 3          Key Management Protocol 3      IPsec Security Services 3          Access Control 4          Anti-replay Services 4         Confidentiality 4          Connectionless Integrity 4          Data Origin Authentication 4          Traffic Flow Confidentiality 4          Components of IPsec 5          Security Parameter Index 5          Security Policy Database 5          Security Association Database 6          Peer Authorization Database 6          Lifetime 7      Cryptography Used in IPsec VPNs 7          Symmetric Cryptography 7          Asymmetric Cryptography 8          The Diffie-Hellman Exchange 8      Public Key Infrastructure 11          Public Key Cryptography 11          Certificate Authorities 12          Digital Certificates 12          Digital Signatures Used in IKEv2 12      Pre-Shared-Keys, or Shared Secret 13      Encryption and Authentication 14          IP Authentication Header 15          Anti-Replay 16  IP Encapsulating Security Payload (ESP) 17          Authentication 18          Encryption 18          Anti-Replay 18          Encapsulation Security Payload Datagram Format 18         Encapsulating Security Payload Version 3 19          Extended Sequence Numbers 19          Traffic Flow Confidentiality 20          Dummy Packets 20      Modes of IPsec 20          IPsec Transport Mode 20          IPsec Tunnel Mode 21      Summary 22      References 22  Part II Understanding IKEv2  Chapter 2 IKEv2: The Protocol 23      IKEv2 Overview 23      The IKEv2 Exchange 24      IKE_SA_INIT 25          Diffie-Hellman Key Exchange 26          Security Association Proposals 29          Security Parameter Index (SPI) 34          Nonce 35          Cookie Notification 36          Certificate Request 38          HTTP_CERT_LOOKUP_SUPPORTED 39      Key Material Generation 39      IKE_AUTH 42          Encrypted and Authenticated Payload 42          Encrypted Payload Structure 43          Identity 44          Authentication 45          Signature-Based Authentication 46          (Pre) Shared-Key-Based Authentication 47          EAP 48          Traffic Selectors 50          Initial Contact 52      CREATE_CHILD_SA 53          IPsec Security Association Creation 53          IPsec Security Association Rekey 54          IKEv2 Security Association Rekey 54      IKEv2 Packet Structure Overview 55      The INFORMATIONAL Exchange 56          Notification 56          Deleting Security Associations 57          Configuration Payload Exchange 58          Dead Peer Detection/Keepalive/NAT Keepalive 59          IKEv2 Request – Response 61      IKEv2 and Network Address Translation 61          NAT Detection 64      Additions to RFC 7296 65      RFC 5998 An Extension for EAP-Only Authentication in IKEv2 65      RFC 5685 Redirect Mechanism for the Internet Key Exchange          Protocol Version 2 (IKEv2) 65      RFC 6989 Additional Diffie-Hellman Tests for the Internet Key          Exchange Protocol Version 2 (IKEv2) 65      RFC 6023 A Childless Initiation of the Internet          Key Exchange Version 2 (IKEv2) Security Association (SA) 66      Summary 66      References 66  Chapter 3 Comparison of IKEv1 and IKEv2 67      Brief History of IKEv1 67      Exchange Modes 69          IKEv1 70          IKEv2 71      Anti-Denial of Service 72      Lifetime 72      Authentication 73      High Availability 74      Traffic Selectors 74      Use of Identities 74      Network Address Translation 74      Configuration Payload 75      Mobility & Multi-homing 75      Matching on Identity 75      Reliability 77      Cryptographic Exchange Bloat 77      Combined Mode Ciphers 77      Continuous Channel Mode 77      Summary 77      References 78  Part III IPsec VPNs on Cisco IOS  Chapter 4 IOS IPsec Implementation 79      Modes of Encapsulation 82          GRE Encapsulation 82          GRE over IPsec 83          IPsec Transport Mode with GRE over IPsec 83          IPsec Tunnel mode with GRE over IPsec 84          Traffic 85          Multicast Traffic 85          Non-IP Protocols 86      The Demise of Crypto Maps 86      Interface Types 87          Virtual Interfaces: VTI and GRE/IPsec 87          Traffic Selection by Routing 88          Static Tunnel Interfaces 90          Dynamic Tunnel Interfaces 91          sVTI and dVTI 92          Multipoint GRE 92      Tunnel Protection and Crypto Sockets 94      Implementation Modes 96          Dual Stack 96          Mixed Mode 96          Auto Tunnel Mode 99      VRF-Aware IPsec 99          VRF in Brief 99          VRF-Aware GRE and VRF-Aware IPsec 101          VRF-Aware GRE over IPsec 102      Summary 103      Reference 104  Part IV IKEv2 Implementation  Chapter 5 IKEv2 Configuration 105      IKEv2 Configuration Overview 105          The Guiding Principle 106          Scope of IKEv2 Configuration 106          IKEv2 Configuration Constructs 106      IKEv2 Proposal 107          Configuring the IKEv2 Proposal 108          Configuring IKEv2 Encryption 111          Configuring IKEv2 Integrity 113          Configuring IKEv2 Diffie-Hellman 113          Configuring IKEv2 Pseudorandom Function 115          Default IKEv2 Proposal 115      IKEv2 Policy 117          Configuring an IKEv2 Policy 118          Configuring IKEv2 Proposals under IKEv2 Policy 119          Configuring Match Statements under IKEv2 Policy 120          Default IKEv2 Policy 121          IKEv2 Policy Selection on the Initiator 122          IKEv2 Policy Selection on Responder 124          IKEv2 Policy Configuration Examples 125          Per-peer IKEv2 Policy 125          IKEv2 Policy with Multiple Proposals 126      IKEv2 Keyring 128          Configuring IKEv2 Keyring 129          Configuring a Peer Block in Keyring 130          Key Lookup on Initiator 132          Key Lookup on Responder 133          IKEv2 Keyring Configuration Example 134          IKEv2 Keyring Key Points 136      IKEv2 Profile 136          IKEv2 Profile as Peer Authorization Database 137          Configuring IKEv2 Profile 138          Configuring Match Statements in IKEv2 Profile 139          Matching any Peer Identity 142          Defining the Scope of IKEv2 Profile 143          Defining the Local IKE Identity 143          Defining Local and Remote Authentication Methods 145          IKEv2 Dead Peer Detection 149          IKEv2 Initial Contact 151          IKEv2 SA Lifetime 151          NAT Keepalives 152          IVRF (inside VRF) 152          Virtual Template Interface 153          Disabling IKEv2 Profile 153          Displaying IKEv2 Profiles 153          IKEv2 Profile Selection on Initiator and Responder 154          IKEv2 Profile Key Points 154      IKEv2 Global Configuration 155          HTTP URL-based Certificate Lookup 156          IKEv2 Cookie Challenge 156          IKEv2 Call Admission Control 157          IKEv2 Window Size 158          Dead Peer Detection 158          NAT Keepalive 159          IKEv2 Diagnostics 159      PKI Configuration 159          Certificate Authority 160          Public-Private Key Pair 162          PKI Trustpoint 163          PKI Example 164      IPsec Configuration 166          IPsec Profile 167          IPsec Configuration Example 168          Smart Defaults 168      Summary 169  Chapter 6 Advanced IKEv2 Features 171      Introduction to IKEv2 Fragmentation 171          IP Fragmentation Overview 172          IKEv2 and Fragmentation 173      IKEv2 SGT Capability Negotiation 178      IKEv2 Session Authentication 181          IKEv2 Session Deletion on Certificate Revocation 182          IKEv2 Session Deletion on Certificate Expiry 184      IKEv2 Session Lifetime 185      Summary 187      References 188  Chapter 7 IKEv2 Deployments 189      Pre-shared-key Authentication with Smart Defaults 189          Elliptic Curve Digital Signature Algorithm Authentication 194          RSA Authentication Using HTTP URL Lookup 200          IKEv2 Cookie Challenge and Call Admission Control 207      Summary 210  Part V FlexVPN  Chapter 8 Introduction to FlexVPN 211      FlexVPN Overview 211          The Rationale 212          FlexVPN Value Proposition 213      FlexVPN Building Blocks 213          IKEv2 213          Cisco IOS Point-to-Point Tunnel Interfaces 214          Configuring Static P2P Tunnel Interfaces 214          Configuring Virtual-Template Interfaces 216          Auto-Detection of Tunnel Encapsulation and Transport 219          Benefits of Per-Peer P2P Tunnel Interfaces 221          Cisco IOS AAA Infrastructure 221          Configuring AAA for FlexVPN 222      IKEv2 Name Mangler 223          Configuring IKEv2 Name Mangler 224          Extracting Name from FQDN Identity 225          Extracting Name from Email Identity 226          Extracting Name from DN Identity 226          Extracting Name from EAP Identity 227      IKEv2 Authorization Policy 228          Default IKEv2 Authorization Policy 229      FlexVPN Authorization 231          Configuring FlexVPN Authorization 233          FlexVPN User Authorization 235          FlexVPN User Authorization, Using an External AAA Server 235          FlexVPN Group Authorization 237          FlexVPN Group Authorization, Using a Local AAA Database 238          FlexVPN Group Authorization, Using an External AAA Server 239          FlexVPN Implicit Authorization 242          FlexVPN Implicit Authorization Example 243          FlexVPN Authorization Types: Co-existence and Precedence 245          User Authorization Taking Higher Precedence 247          Group Authorization Taking Higher Precedence 249      FlexVPN Configuration Exchange 250          Enabling Configuration Exchange 250          FlexVPN Usage of Configuration Payloads 251          Configuration Attributes and Authorization 253          Configuration Exchange Examples 259      FlexVPN Routing 264          Learning Remote Subnets Locally 265          Learning Remote Subnets from Peer 266      Summary 268  Chapter 9 FlexVPN Server 269      Sequence of Events 270      EAP Authentication 271          EAP Methods 272          EAP Message Flow 273          EAP Identity 273          EAP Timeout 275          EAP Authentication Steps 275          Configuring EAP 277          EAP Configuration Example 278      AAA-based Pre-shared Keys 283          Configuring AAA-based Pre-Shared Keys 284          RADIUS Attributes for AAA-Based Pre-Shared Keys 285          AAA-Based Pre-Shared Keys Example 285      Accounting 287      Per-Session Interface 290          Deriving Virtual-Access Configuration from a Virtual Template 291          Deriving Virtual-Access Configuration from AAA Authorization 293          The interface-config AAA Attribute 293          Deriving Virtual-Access Configuration from an Incoming Session 294          Virtual-Access Cloning Example 295      Auto Detection of Tunnel Transport and Encapsulation 297      RADIUS Packet of Disconnect 299          Configuring RADIUS Packet of Disconnect 300          RADIUS Packet of Disconnect Example 301      RADIUS Change of Authorization (CoA) 303          Configuring RADIUS CoA 304          RADIUS CoA Examples 305          Updating Session QoS Policy, Using CoA 305          Updating the Session ACL, Using CoA 307      IKEv2 Auto-Reconnect 309          Auto-Reconnect Configuration Attributes 310          Smart DPD 311          Configuring IKEv2 Auto-Reconnect 313      User Authentication, Using AnyConnect-EAP 315          AnyConnect-EAP 315          AnyConnect-EAP XML Messages for User Authentication 316          Configuring User Authentication, Using AnyConnect-EAP 318          AnyConnect Configuration for Aggregate Authentication 320      Dual-factor Authentication, Using AnyConnect-EAP 320          AnyConnect-EAP XML Messages for dual-factor authentication 322          Configuring Dual-factor Authentication, Using AnyConnect-EAP 324      RADIUS Attributes Supported by the FlexVPN Server 325      Remote Access Clients Supported by FlexVPN Server 329          FlexVPN Remote Access Client 329          Microsoft Windows7 IKEv2 Client 329          Cisco IKEv2 AnyConnect Client 330      Summary 330      Reference 330  Chapter 10 FlexVPN Client 331      Introduction 331      FlexVPN Client Overview 332          FlexVPN Client Building Blocks 333          IKEv2 Configuration Exchange 334          Static Point-to-Point Tunnel Interface 334          FlexVPN Client Profile 334          Object Tracking 334          NAT 335          FlexVPN Client Features 335          Dual Stack Support 335          EAP Authentication 335          Dynamic Routing 335          Support for EzVPN Client and Network Extension Modes 336          Advanced Features 336      Setting up the FlexVPN Server 336      EAP Authentication 337      Split-DNS 338          Components of Split-DNS 340      Windows Internet Naming Service (WINS) 343      Domain Name 344      FlexVPN Client Profile 345      Backup Gateways 346          Resolution of Fully Qualified Domain Names 346          Reactivating Peers 346          Backup Gateway List 347      Tunnel Interface 347          Tunnel Source 348          Tunnel Destination 349      Tunnel Initiation 350          Automatic Mode 350          Manual Mode 350          Track Mode 350          Tracking a List of Objects, Using a Boolean Expression 350      Dial Backup 352      Backup Group 353      Network Address Translation 354      Design Considerations 356          Use of Public Key Infrastructure and Pre-Shared Keys 356          The Power of Tracking 356          Tracked Object Based on Embedded Event Manager 356      Troubleshooting FlexVPN Client 358          Useful Show Commands 358          Debugging FlexVPN Client 360          Clearing IKEv2 FlexVPN Client Sessions 360      Summary 361  Chapter 11 FlexVPN Load Balancer 363      Introduction 363      Components of the FlexVPN Load Balancer 363          IKEv2 Redirect 363          Hot Standby Routing Protocol 366      FlexVPN IKEv2 Load Balancer 367          Cluster Load 369          IKEv2 Redirect 372          Redirect Loops 373      FlexVPN Client 374      Troubleshooting IKEv2 Load Balancing 374      IKEv2 Load Balancer Example 376      Summary 379  Chapter 12 FlexVPN Deployments 381      Introduction 381      FlexVPN AAA-Based Pre-Shared Keys 381          Configuration on the Branch-1 Router 382          Configuration on the Branch-2 Router 383          Configuration on the Hub Router 383          Configuration on the RADIUS Server 384      FlexVPN User and Group Authorization 386          FlexVPN Client Configuration at Branch 1 386          FlexVPN Client Configuration at Branch 2 387          Configuration on the FlexVPN Server 387          Configuration on the RADIUS Server 388          Logs Specific to FlexVPN Client-1 389          Logs Specific to FlexVPN Client-2 390      FlexVPN Routing, Dual Stack, and Tunnel Mode Auto 391          FlexVPN Spoke Configuration at Branch-1 392          FlexVPN Spoke Configuration at Branch-2 394          FlexVPN Hub Configuration at the HQ 395          Verification on FlexVPN Spoke at Branch-1 397          Verification on FlexVPN Spoke at Branch-2 399          Verification on the FlexVPN Hub at HQ 401      FlexVPN Client NAT to the Server-Assigned IP Address 404          Configuration on the FlexVPN Client 404          Verification on the FlexVPN Client 405      FlexVPN WAN Resiliency, Using Dynamic Tunnel Source 407          FlexVPN Client Configuration on the Dual-Homed Branch Router 408          Verification on the FlexVPN Client 409      FlexVPN Hub Resiliency, Using Backup Peers 411          FlexVPN Client Configuration on the Branch Router 411          Verification on the FlexVPN Client 412      FlexVPN Backup Tunnel, Using Track-Based Tunnel Activation 414          Verification on the FlexVPN Client 415      Summary 416  Part VI IPsec VPN Maintenance  Chapter 13 Monitoring IPsec VPNs 417      Introduction to Monitoring 417          Authentication, Authorization, and Accounting (AAA) 418          NetFlow 418          Simple Network Management Protocol 419          VRF-Aware SNMP 420          Syslog 421      Monitoring Methodology 422          IP Connectivity 423          VPN Tunnel Establishment 425          Cisco IPsec Flow Monitor MIB 425          SNMP with IKEv2 425          Syslog 428          Pre-Shared Key Authentication 429          PKI Authentication 431          EAP Authentication 434          Authorization Using RADIUS-Based AAA 436          Data Encryption: SNMP with IPsec 437          Overlay Routing 439          Data Usage 440      Summary 443      References 443  Chapter 14 Troubleshooting IPsec VPNs 445      Introduction 445      Tools of Troubleshooting 446          Show Commands 447          Syslog Messages 447          Event-Trace Monitoring 447          Debugging 449          IKEv2 Debugging 449          IPsec Debugging 453          Key Management Interface Debugging 453          PKI Debugging 456          Conditional Debugging 456      IP Connectivity 457      VPN Tunnel Establishment 460          IKEv2 Diagnose Error 460          Troubleshooting the IKE_SA_INIT Exchange 461          Troubleshooting the IKE_AUTH Exchange 464      Authentication 464          Troubleshooting RSA or ECDSA Authentication 465          Certificate Attributes 469          Debugging Authentication Using PKI 470          Certificate Expiry 470          Matching Peer Using Certificate Maps 472          Certificate Revocation 473          Trustpoint Configuration 476          Trustpoint Selection 476          Pre-Shared Key 478          Extensible Authentication Protocol (EAP) 480      Authorization 485      Data Encryption 488          Debugging IPsec 488          IPsec Anti-Replay 491      Data Encapsulation 495          Mismatching GRE Tunnel Keys 495      Overlay Routing 495          Static Routing 496          IKEv2 Routing 496          Dynamic Routing Protocols 498      Summary 499      References 502  Part VII IPsec Overhead  Chapter 15 IPsec Overhead and Fragmentation 503      Introduction 503      Computing the IPsec Overhead 504          General Considerations 504          IPsec Mode Overhead (without GRE) 505          GRE Overhead 505          Encapsulating Security Payload Overhead 507          Authentication Header Overhead 509          Encryption Overhead 510          Integrity Overhead 511          Combined-mode Algorithm Overhead 512          Plaintext MTU 513          Maximum Overhead 514          Maximum Encapsulation Security Payload Overhead 515          Maximum Authentication Header Overhead 516          Extra Overhead 516      IPsec and Fragmentation 518          Maximum Transmission Unit 518          Fragmentation in IPv4 519          Fragmentation in IPv6 522          Path MTU Discovery 523          TCP MSS Clamping 525          MSS Refresher 525          MSS Adjustment 526          IPsec Fragmentation and PMTUD 527          Fragmentation on Tunnels 531          IPsec Only (VTI) 531          GRE Only 532          GRE over IPsec 534          Tunnel PMTUD 534          The Impact of Fragmentation 535      Summary 536      References 536  Part VIII Migration to IKEv2  Chapter 16 Migration Strategies 539      Introduction to Migrating to IKEv2 and FlexVPN 539      Consideration when Migrating to IKEv2 539          Hardware Limi


Best Sellers


Product Details
  • ISBN-13: 9780134426372
  • Binding: Digital download
  • No of Pages: 656
  • Weight: 1 gr
  • ISBN-10: 0134426371
  • Language: English
  • Sub Title: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS
-
IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!