- Discusses examples of VPN designs that reflect what is supported by the standards and what is currently being implemented
- Defines and provides examples of implementations and the process to complete them in a timely, secure fashion
- Covers the process of setting up communications and providing keys for further encrypted communications
- Provides the history and general explanation of Virtual Private Networks (VPN)
- Contains a section on cryptography theory, practice and applications
- Supplies a technical description of the RFCs that define the standard
- Includes a detailed description of the IPSec suite of protocols and their use on various applications
What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become.
A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security.
Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies.
After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.