Virtual Private Networks For Dummies

Paperback
from $0.00

Author: Mark S. Merkow

ISBN-10: 0764505904

ISBN-13: 9780764505904

Category: Enterprise Networks

Let’s face it: the information age makes dummies of us all at some point. One thing we can say for sure, though, about things related to the Internet is that their best strengths are often also their worst weaknesses. This goes for virtual private networks (VPNs). They may reach a wide base of customers – but can also be vulnerable to viruses, hackers, spoofers, and other shady online characters and entities. VPNs may allow for super-efficient communication between customer and...

Search in google:

Let’s face it: the information age makes dummies of us all at some point. One thing we can say for sure, though, about things related to the Internet is that their best strengths are often also their worst weaknesses. This goes for virtual private networks (VPNs). They may reach a wide base of customers – but can also be vulnerable to viruses, hackers, spoofers, and other shady online characters and entities. VPNs may allow for super-efficient communication between customer and company – but they rely on information which, if compromised, can cause huge losses. The Internet is still a frontier – sometimes so wide open it leaves us bewildered – and, like any frontier, the risks go hand in hand with potentially huge rewards. Virtual Private Networks for Dummies offers you a no-nonsense, practical guide to evaluating your company’s need for a VPN, understanding what it takes to implement one, and undertaking the challenging quest to set it up, make it work, and keep it safe. Whether you’re the resident expert leading the project team, or you just want to learn what makes e-commerce tick, this detailed, from-the-ground-up guide will soon have you comfortably conceptualizing: Security goals and strategies The evolution of VPNs Privacy in VPNs Extranets Remote-Access VPNs Funding Custom network solutions design Testing VPNs And more With new products and technologies offering supposedly revolutionary solutions to IT departments every day, this book focuses on the real world – you know, the one full of obstacles,mishaps, threats, delays, and errors – and gives you the background knowledge to make decisions for yourself about your VPN needs. Written with a dash of humor, Virtual Private Networks for Dummies contains both technical detail (standards, protocols, etc.) and more general concepts (such as conducting cost-benefit analyses). This clear, authoritative guide will have you securely and cost-effectively networking over the Internet in no time.

Introduction1About This Book1Who Should Read This Book2How This Book Is Organized2Icons in This Book4Where to Go from Here4Part IUnlocking the Mysteries of VPNs5Chapter 1Embracing Virtual Private Networks7Security Goals and Strategies7Where VPNs Fit In9Security Threats Are Everywhere11Chapter 2Touring the Land of VPNs17Problems Before VPNs17The Evolution of VPN Technologies19Chapter 3Putting Privacy into VPNs25It's All About Trust25From Distrust to Semi-Trust via Cryptography27Two Methods of Cryptography27Keys, Keys, Who's Got the Keys?32PPK -- It Can Save Your Hash36Chapter 4Public Keys, Private Messages43Components of a PKI44Growing a Tree of Trust45Prove Yourself! -- Digital Certificates In Action48Certificate Authority Responsibilities58Certificate Practice Statements61Chapter 5Fighting for the QoS63Policies at Your Service64The Importance of Service-Level Agreements69Establishing Your Own Service-Level Agreements70Part IIApplying VPNs in the Real World73Chapter 6Extraordinary Extranets75Three Frontiers of Extranets75Bridging Internet and Intranet76Extranets Gain Help from the Industry77Modern Extranet-Enabling Technologies79Case Studies in Extranets84Walk Briskly, but Watch Your Step86Chapter 7Remotely Possible89Why Remote-Access VPNs?90Building Strong Authentication91Case Studies in Remote-Access VPN Success97Computer-Telephony Integration (CTI)98Chapter 8Branching Out All Over103Put Your VPN Out on a Limb and Love It103Branch-Office VPNs -- Ripe for the Picking106Cultivating the Benefits of Branch-Office VPNs107Pruning the Problems of Branch-Office VPNs111Chapter 9Justify Yourself115Inside Cost-Benefit Analysis115VPN Development: Go, Team, Go!120Cost Reduction in a Sample VPN Deployment124Chapter 10Let Your Requirements Be Your Guide127Square One: Preliminary Analysis and Project Development128Detailed Systems Analysis132Control and Support of Your VPN140Part IIIRoadmap for VPN Solutions143Chapter 11Designing Custom VPN Network Solutions145System Design and Development: Who, Me?145Secure That Back-Office Network!146What Is Multiprocessing -- and Why did I Ask?149The Fashionably Modular Back Office152Network Design: Tiers for Fears157Wrapping a Secure Network in a Secure VPN159Chapter 12Evaluating and Selecting VPN and PKI Solutions161Plan for Tomorrow, but Live for Today161The Common Criteria (CC) for Information Technology Security165Evaluating PKI Solution Providers176Chapter 13Implementing Your VPN and PKI183Does a VPN Make Me King of E-Commerce?183IPSec VPN Implementation in Four Steps184Using Digital Certificates to Access VPNs189Chapter 14Testing Your VPN193Standards-Compliance Testing: Does Your VPN Measure Up?194Testing for Interoperability195Security Testing. Again198End-User Testing202Chapter 15Living in a VPN-Wired World205Now What?206The (Digital) Writing Is on the Wall206International Implications of Using VPNs210Cryptography on the Horizon211Elliptical Curve Cryptography? Hang On212Maintaining a Sentry Position213Attaining VPN Nirvana215Part IVThe Part of Tens218Chapter 16Ten VPN Online Information Sources219VPN Source Page at Internet Week Online219Network World Fusion VPN Information Site220The NIST IPSec Project Home Page220International Computer Security Association (ICSA) Library221EarthWeb CrossNodes Technologies Information Resources222VPN Insider223VPDN.com223The ISPortal224Electronic Privacy Information Center (EPIC)224VPN Operator's Home Page225Chapter 17More Than Ten VPN Standards227IPSec Internet Drafts: The Horse's Mouth229Internet Drafts Related to X.509 Public-Key Infrastructure235Chapter 18More Than Ten Steps to an Information Privacy Checklist239Responsible Information Handling239Privacy Policies for Client Relations240Privacy Policies for Employee Relations245Chapter 19Ten Security and Security- Testing Specialists249Counterpane Systems249Deloitte and Touche250Ernst & Young's eSecurity Solutions251InfoSec Labs Inc. (Formerly Miora Systems Consulting)252LOpht Heavy Industries253Network Associates Global Professional Services254Network Security Laboratories, Inc. (NSLI)254Secure Computing Corporation256SecurelT257Trident Data Systems257Part VAppendixes259Appendix AVPN Buyer's Guide261Access Utility with Integrated Firewall and VPN262Dedicated VPN Hardware262Dedicated VPN Hardware (with Concentrator)266Firewall with VPN266Internet-Access Appliances with Router, Firewall, and VPN270Multiaccess Connector with Integrated Firewall and VPN272Routers with VPNs274Software-Based VPNs276Switches with Routing, VPN, Firewall278VPN Gateways with Firewalls280Vendor Contact Information282Appendix BGlossary285Appendix CInside IPSec295Index303Book Registration Information