Amazing Books
Temporary Blank

Wednesday, September 21, 2011

The Complete Cisco VPN Configuration Guide

By Richard Deal
Publisher: Cisco Press
Pub Date: December 15, 2005
ISBN: 1-58705-204-0
Pages: 1032

Table of Contents | Index

The definitive guide to building a complete VPN solution with Cisco routers, PIX Firewalls, concentrators, and remote access clients

A complete resource for understanding VPN components and VPN design issues

Understand state-of-the-art VPN connection types like IPSec, PPTP, and L2TP

Real-world case studies detail implementation of complex VPN configurations on Cisco devices including routers, PIX Firewalls, concentrators, and software and hardware clients

Virtual Private Networks (VPNs) are the most popular component in a company's remote access solution. With increased use of Internet connectivity and less reliance on private WAN networks, VPNs provide a much-needed secure method of transferring critical information. Vendors like Cisco Systems continually upgrade products to provide features that take advantage of advances in standards and protocols like IPSec and L2TP (Layer 2 Tunneling Protocol). Cisco VPN equipment is at the center of this access revolution; nearly every enterprise network contains Cisco gear and most of this equipment supports VPN functionality. As Cisco integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. Engineers need to know how to set up various VPN deployments using Cisco equipment. Currently, there is no single book that covers how to deploy VPNs using all of Cisco's VPN-capable products, including IOS routers, PIX Firewalls, 3000 series Concentrators, and the Cisco software and hardware clients. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco VPN products, describing the details of setting up IPSec and SSL connections on any type of Cisco device, including concentrators, clients, routers, or the PIX Firewall. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN design.

About the Author
About the Technical Reviewers
Icons Used in This Book
Command Syntax Conventions
Goals and Methods
Who Should Read This Book?
How This Book Is Organized
Additional Information
Part I: VPNs
Chapter 1. Overview of VPNs
Traffic Issues
VPN Definition
VPN Components
VPN Designs
VPN Implementations
VPNs: Choosing a Solution
Chapter 2. VPN Technologies
Packet Authentication
Key Exchange
Authentication Methods
Chapter 3. IPsec
IPsec Standards
IPsec Traffic and Networks
Chapter 4. PPTP and L2TP
Chapter 5. SSL VPNs
SSL Overview
When to Use SSL VPNs
Cisco WebVPN Solution
Part II: Concentrators
Chapter 6. Concentrator Product Information
Concentrator Models
Concentrator Modules
Concentrator Features
Introduction to Accessing a Concentrator
Chapter 7. Concentrator Remote Access Connections with IPsec
Controlling Remote Access Sessions to the Concentrator
IPsec Remote Access
Network Access Control (NAC) for IPsec and L2TP/IPsec Users
Chapter 8. Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
PPTP and L2TP Remote Access
WebVPN Remote Access
Chapter 9. Concentrator Site-to-Site Connections
L2L Connectivity Example
ISAKMP/IKE Phase 1 Preparation
Adding Site-to-Site Connections
Address Translation and L2L Sessions
Chapter 10. Concentrator Management
Bandwidth Management
Routing on the Concentrator
Chassis Redundancy
Administration Screens
Chapter 11. Verifying and Troubleshooting Concentrator Connections
Concentrator Tools
Troubleshooting Problems
Part III: Clients
Chapter 12. Cisco VPN Software Client
Cisco VPN Client Overview
Cisco VPN Client Interface
IPsec Connections
VPN Client GUI Options
VPN Client Software Updates
VPN Client Troubleshooting
Chapter 13. Windows Software Client
Windows Client
Configuring the Windows VPN Client
Configuring the VPN 3000 Concentrator
Microsoft Client Connections
Troubleshooting VPN Connections
Chapter 14. 3002 Hardware Client
Overview of the 3002 Hardware Client
Initial Access to the 3002
Authentication and Connection Options
Connection Modes
Administrative Tasks
Part IV: IOS Routers
Chapter 15. Router Product Information
Router Deployment Scenarios
Router Product Overview
Chapter 16. Router ISAKMP/IKE Phase 1 Connectivity
IPsec Preparation
ISAKMP/IKE Phase 1 Policies
ISAKMP/IKE Phase 1 Device Authentication
Monitoring and Managing Management Connections
Routers as Certificate Authorities
Chapter 17. Router Site-to-Site Connections
ISAKMP/IKE Phase 2 Configuration
Viewing and Managing Connections
Issues with Site-to-Site Connections
Chapter 18. Router Remote Access Connections
Easy VPN Server
Easy VPN Remote
IPsec Remote Access and L2L Sessions on the Same Router
Chapter 19. Troubleshooting Router Connections
ISAKMP/IKE Phase 1 Connections
ISAKMP/IKE Phase 2 Connections
New IPsec Troubleshooting Features
Fragmentation Problems
Part V: PIX Firewalls
Chapter 20. PIX and ASA Product Information
PIX Deployment Scenarios
PIX and ASA Feature and Product Overview
Chapter 21. PIX and ASA Site-to-Site Connections
ISAKMP/IKE Phase 1 Management Connection
ISAKMP/IKE Phase 2 Data Connections
L2L Connection Examples
Chapter 22. PIX and ASA Remote Access Connections
Easy VPN Server Support for 6.x
Easy VPN Remote Support for 6.x
Easy VPN Server Support for 7.0
Chapter 23. Troubleshooting PIX and ASA Connections
ISAKMP/IKE Phase 1 Connections
ISAKMP/IKE Phase 2 Connections
Part VI: Case Study
Chapter 24. Case Study
Company Profile
Case Study Configuration

Another VPN Books

No comments:

Post a Comment

Related Posts with Thumbnails

Put Your Ads Here!