Wednesday, September 21, 2011

The Complete Cisco VPN Configuration Guide







By Richard Deal
...............................................
Publisher: Cisco Press
Pub Date: December 15, 2005
ISBN: 1-58705-204-0
Pages: 1032





Table of Contents | Index

The definitive guide to building a complete VPN solution with Cisco routers, PIX Firewalls, concentrators, and remote access clients

A complete resource for understanding VPN components and VPN design issues

Understand state-of-the-art VPN connection types like IPSec, PPTP, and L2TP

Real-world case studies detail implementation of complex VPN configurations on Cisco devices including routers, PIX Firewalls, concentrators, and software and hardware clients

Virtual Private Networks (VPNs) are the most popular component in a company's remote access solution. With increased use of Internet connectivity and less reliance on private WAN networks, VPNs provide a much-needed secure method of transferring critical information. Vendors like Cisco Systems continually upgrade products to provide features that take advantage of advances in standards and protocols like IPSec and L2TP (Layer 2 Tunneling Protocol). Cisco VPN equipment is at the center of this access revolution; nearly every enterprise network contains Cisco gear and most of this equipment supports VPN functionality. As Cisco integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. Engineers need to know how to set up various VPN deployments using Cisco equipment. Currently, there is no single book that covers how to deploy VPNs using all of Cisco's VPN-capable products, including IOS routers, PIX Firewalls, 3000 series Concentrators, and the Cisco software and hardware clients. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco VPN products, describing the details of setting up IPSec and SSL connections on any type of Cisco device, including concentrators, clients, routers, or the PIX Firewall. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN design.

Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Introduction
Goals and Methods
Who Should Read This Book?
How This Book Is Organized
Additional Information
Part I: VPNs
Chapter 1. Overview of VPNs
Traffic Issues
VPN Definition
VPN Components
VPN Designs
VPN Implementations
VPNs: Choosing a Solution
Summary
Chapter 2. VPN Technologies
Keys
Encryption
Packet Authentication
Key Exchange
Authentication Methods
Summary
Chapter 3. IPsec
IPsec Standards
ISAKMP/IKE Phase 1
ISAKMP/IKE Phase 2
IPsec Traffic and Networks
Summary
Chapter 4. PPTP and L2TP
PPTP
L2TP
Summary
Chapter 5. SSL VPNs
SSL Overview
When to Use SSL VPNs
Cisco WebVPN Solution
Summary
Part II: Concentrators
Chapter 6. Concentrator Product Information
Concentrator Models
Concentrator Modules
Concentrator Features
Introduction to Accessing a Concentrator
Summary
Chapter 7. Concentrator Remote Access Connections with IPsec
Controlling Remote Access Sessions to the Concentrator
IPsec Remote Access
Network Access Control (NAC) for IPsec and L2TP/IPsec Users
Summary
Chapter 8. Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
PPTP and L2TP Remote Access
WebVPN Remote Access
Summary
Chapter 9. Concentrator Site-to-Site Connections
L2L Connectivity Example
ISAKMP/IKE Phase 1 Preparation
Adding Site-to-Site Connections
Address Translation and L2L Sessions
Summary
Chapter 10. Concentrator Management
Bandwidth Management
Routing on the Concentrator
Chassis Redundancy
Administration Screens
Summary
Chapter 11. Verifying and Troubleshooting Concentrator Connections
Concentrator Tools
Troubleshooting Problems
Summary
Part III: Clients
Chapter 12. Cisco VPN Software Client
Cisco VPN Client Overview
Cisco VPN Client Interface
IPsec Connections
VPN Client GUI Options
VPN Client Software Updates
VPN Client Troubleshooting
Summary
Chapter 13. Windows Software Client
Windows Client
Configuring the Windows VPN Client
Configuring the VPN 3000 Concentrator
Microsoft Client Connections
Troubleshooting VPN Connections
Summary
Chapter 14. 3002 Hardware Client
Overview of the 3002 Hardware Client
Initial Access to the 3002
Authentication and Connection Options
Connection Modes
Administrative Tasks
Summary
Part IV: IOS Routers
Chapter 15. Router Product Information
Router Deployment Scenarios
Router Product Overview
Summary
Chapter 16. Router ISAKMP/IKE Phase 1 Connectivity
IPsec Preparation
ISAKMP/IKE Phase 1 Policies
ISAKMP/IKE Phase 1 Device Authentication
Monitoring and Managing Management Connections
Routers as Certificate Authorities
Summary
Chapter 17. Router Site-to-Site Connections
ISAKMP/IKE Phase 2 Configuration
Viewing and Managing Connections
Issues with Site-to-Site Connections
Summary
Chapter 18. Router Remote Access Connections
Easy VPN Server
Easy VPN Remote
IPsec Remote Access and L2L Sessions on the Same Router
WebVPN
Summary
Chapter 19. Troubleshooting Router Connections
ISAKMP/IKE Phase 1 Connections
ISAKMP/IKE Phase 2 Connections
New IPsec Troubleshooting Features
Fragmentation Problems
Summary
Part V: PIX Firewalls
Chapter 20. PIX and ASA Product Information
PIX Deployment Scenarios
PIX and ASA Feature and Product Overview
Summary
Chapter 21. PIX and ASA Site-to-Site Connections
ISAKMP/IKE Phase 1 Management Connection
ISAKMP/IKE Phase 2 Data Connections
L2L Connection Examples
Summary
Chapter 22. PIX and ASA Remote Access Connections
Easy VPN Server Support for 6.x
Easy VPN Remote Support for 6.x
Easy VPN Server Support for 7.0
Summary
Chapter 23. Troubleshooting PIX and ASA Connections
ISAKMP/IKE Phase 1 Connections
ISAKMP/IKE Phase 2 Connections
Summary
Part VI: Case Study
Chapter 24. Case Study
Company Profile
Case Study Configuration
Summary
Index


Another VPN Books
Download

No comments:

Post a Comment

Related Posts with Thumbnails

Put Your Ads Here!