IPSec VPN design (Record no. 2712)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100223s2005 inua 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2002106378
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781587051111(pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1587051117 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u3726
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Bollapragada, Vijay.
9 (RLIN) 7334
245 10 - TITLE STATEMENT
Title IPSec VPN design
Remainder of title the definitive design and deployment guide for secure virtual private networks /
Statement of responsibility, etc. Vijay Bollapragada, Mohamed Khalid, Scott Wainner.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Indianapolis, IN. :
Name of publisher, distributor, etc. Cisco Press,
Date of publication, distribution, etc. c2005.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 352 p. :
Other physical details ill. ;
Dimensions 24 cm.
490 0# - SERIES STATEMENT
Series statement Networking technology series
500 ## - GENERAL NOTE
General note Cover title.
500 ## - GENERAL NOTE
General note Includes index
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 Introduction to VPNs -- Chapter 2 IPSec Overview -- Chapter 3 Enhanced IPSec Features -- Chapter 4 IPSec Authentication and Authorization Models -- Chapter 5 IPSec VPN Architectures -- Chapter 6 Designing Fault-Tolerant IPSec VPNs -- Chapter 7 Auto-Configuration Architectures for Site-to-Site IPSec VPNs -- Chapter 8 IPSec and Application Interoperability -- Chapter 9 Network-Based IPSec VPNs -- Index.
520 ## - SUMMARY, ETC.
Summary, etc. he definitive design and deployment guide for secure virtual private networks : Learn about IPSec protocols and Cisco IOS IPSec packet processing, Understand the differences between IPSec tunnel mode and transport mode, Evaluate the IPSec features that improve VPN scalability and fault tolerance, such as dead peer detection and control plane keepalives, Overcome the challenges of working with NAT and PMTUD, Explore IPSec remote-access features, including extended authentication, mode-configuration, and digital certificates, Examine the pros and cons of various IPSec connection models such as native IPSec, GRE, and remote access, Apply fault tolerance methods to IPSec VPN designs, Employ mechanisms to alleviate the configuration complexity of a large- scale IPSec VPN, including Tunnel End-Point Discovery (TED) and Dynamic Multipoint VPNs (DMVPN), Add services to IPSec VPNs, including voice and multicast, Understand how network-based VPNs operate and how to integrate IPSec VPNs with MPLS VPNs. Among the many functions that networking technologies permit is the ability for organizations to easily and securely communicate with branch offices, mobile users, telecommuters, and business partners. Such connectivity is now vital to maintaining a competitive level of business productivity. Although several technologies exist that can enable interconnectivity among business sites, Internet-based virtual private networks (VPNs) have evolved as the most effective means to link corporate network resources to remote employees, offices, and mobile workers. VPNs provide productivity enhancements, efficient and convenient remote access to network resources, site-to-site connectivity, a high level of security, and tremendous cost savings. IPSec VPN Design is the first book to present a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. Divided into three parts, the book provides a solid understanding of design and architectural issues of large-scale, secure VPN solutions. Part I includes a comprehensive introduction to the general architecture of IPSec, including its protocols and Cisco IOS® IPSec implementation details. Part II examines IPSec VPN design principles covering hub-and-spoke, full-mesh, and fault-tolerant designs. This part of the book also covers dynamic configuration models used to simplify IPSec VPN designs. Part III addresses design issues in adding services to an IPSec VPN such as voice and multicast. This part of the book also shows you how to effectively integrate IPSec VPNs with MPLS VPNs. IPSec VPN Design provides you with the field-tested design and configuration advice to help you deploy an effective and secure VPN solution in any environment. This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element IPSec (Computer network protocol)
9 (RLIN) 7335
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Extranets (Computer networks)
General subdivision Security measures.
9 (RLIN) 7336
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Khalid, Mohamed.
9 (RLIN) 6759
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wainner, Scott.
9 (RLIN) 7337
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 BAC_P   005.8 / BO.I 2005 005875 11/24/2019 1 11/24/2019 Books