Raftul cu initiativa Book Archive


SSL Remote Access VPNs (Network Security) by Qiang Huang, Jazib Frahim

By Qiang Huang, Jazib Frahim

SSL distant entry VPNs   An advent to designing and configuring SSL digital deepest networks   Jazib Frahim, CCIE® No. 5459 Qiang Huang, CCIE No. 4937   Cisco® SSL VPN suggestions (formerly referred to as Cisco WebVPN recommendations) provide you with a versatile and safe method to expand networking assets to nearly any distant consumer with entry to the net and an online browser. distant entry in keeping with SSL VPN can provide safe entry to community assets via developing an encrypted tunnel around the net utilizing a broadband (cable or DSL) or ISP dialup connection.   SSL distant entry VPNs will give you a simple operating wisdom of SSL digital inner most networks on Cisco SSL VPN-capable units. layout tips is equipped to help you in imposing SSL VPN in current community infrastructures. This contains studying latest and software program to figure out whether or not they are SSL VPN able, supplying layout ideas, and guiding you on establishing the Cisco SSL VPN units. universal deployment situations are lined to aid you in deploying an SSL VPN on your community.   SSL distant entry VPNs can provide every thing you must understand to appreciate, layout, set up, configure, and troubleshoot the entire elements that make up an efficient, safe SSL VPN resolution.   Jazib Frahim, CCIE® No. 5459, is at present operating as a technical chief within the world wide protection prone perform of the Cisco complex companies for community defense. he's liable for guiding buyers within the layout and implementation in their networks, with a spotlight on community safety. He holds CCIEs, one in routing and switching and the opposite in defense.   Qiang Huang, CCIE No. 4937, is a product supervisor within the Cisco Campus change approach expertise staff, concentrating on using the protection and clever providers roadmap for market-leading modular Ethernet switching structures. in the course of his time at Cisco, Qiang has performed an enormous position in a couple of know-how teams, together with the Cisco TAC safeguard and VPN staff, the place he was once liable for trouble-shooting advanced buyer deployments in protection and VPN ideas. Qiang has wide wisdom of defense and VPN applied sciences and event in real-life consumer deployments. Qiang holds CCIE certifications in routing and switching, safety, and ISP Dial.   comprehend distant entry VPN applied sciences, akin to Point-to-Point Tunneling Protocol (PPTP), web Protocol safeguard (IPsec), Layer 2 Forwarding (L2F), Layer 2 Tunneling (L2TP) over IPsec, and SSL VPN find out about the development blocks of SSL VPN, together with cryptographic algorithms and SSL and delivery Layer safeguard (TLS) review universal layout most sensible practices for making plans and designing an SSL VPN resolution achieve perception into SSL VPN performance on Cisco Adaptive protection equipment (ASA) and Cisco IOS® routers set up and configure SSL VPNs on Cisco ASA and Cisco IOS routers deal with your SSL VPN deployment utilizing Cisco safeguard supervisor   This defense e-book is a part of the Cisco Press® Networking expertise sequence. safeguard titles from Cisco Press aid networking execs safe serious information and assets, hinder and mitigate community assaults, and construct end-to-end self-defending networks.   type: Networking: defense Covers: SSL VPNs  

Show description

Read Online or Download SSL Remote Access VPNs (Network Security) PDF

Best comptia books

Internet Security Cryptographic Principles Algorithms and Protocols

Wisdom of quantity thought and summary algebra are pre-requisites for any engineer designing a safe internet-based method. notwithstanding, many of the books at the moment to be had at the topic are aimed toward practitioners who simply need to know how many of the instruments available to buy paintings and what point of protection they convey.

CompTIA A+ 220-701 and 220-702 Cert Guide

Enable me commence via asserting that at the present time I took the 220-701, the 1st of the necessary checks. I handed with a rating of 775, which as top i will determine correlates to among eighty five and ninety on a a hundred aspect scale. My research was once completely self-directed and consisted of utilizing 4 various books, the A+ video sequence from ok Alliance and examination prep software program from [.

Pro PHP Security (Pro)

Personal home page is the world’s hottest open resource net scripting language, put in on nearly 17 million domain names around the globe (www. personal home page. net/usage. php). it's enjoyed through newcomers and embraced through complex clients. This e-book bargains builders a whole consultant to taking either protecting and proactive safeguard methods inside their personal home page purposes.

Secure Data Management in Decentralized Systems

The study scope of database defense has accelerated tremendously, a result of swift improvement of the worldwide inter-networked infrastructure. Databases are not any longer stand-alone structures which are in simple terms available to inner clients of firms. in its place, permitting selective entry from various safeguard domain names has turn into a needs to for lots of enterprise practices.

Extra resources for SSL Remote Access VPNs (Network Security)

Example text

PPTP packages data within Point-to-Point Protocol (PPP) and then wraps the data within IP packets. PPTP uses an extended version of Generic Routing Encapsulation (GRE) Protocol as the encapsulating mechanism to make the IP packets routable. With PPTP, the client uses TCP port 1723 to initiate the connection to the PPTP gateway. The gateway prompts the user for authentication credentials. After successfully authenticating the user and negotiating other parameters, such as compression and encryption, the client encapsulates data packets in GRE and transmits them to the gateway over an insecure connection.

Cryptographic Building Blocks of SSL VPNs Figure 2-2 21 Applications of Asymmetric Algorithms Alice’s Public Key Ring Joe Bob’s Private Key Mike Bob Bob’s Public Key Cipher Text Plain Text Encryption() RSA Plain Text Decryption() Transmit Cipher Text Encryption Authentication Bob’s Public Key Ring Alice’s Private Key Joe Mike Alice Alice’s Public Key Plain Text Cipher Text Encryption() RSA Plain Text Decryption() Transmit Cipher Text RC4 Designed by Ron Rivest in 1987 for RSA Security, RC4 is the mostly widely used stream cipher.

SSL and TLS The following sections provide a brief overview of the SSL and TLS protocols. First, the evolution of these protocols is discussed. This is followed by protocol details to show how SSL and TLS employ the cryptographic building blocks that have just been described to provide secure communication. A short case study follows to show the protocol in action. SSL and TLS History The Secure Socket Layer (SSL) was originally developed in the 1990s by Netscape Communications to allow communications to occur securely in the World Wide Web (WWW) environment, which accommodates e-commerce applications such as online shopping.

Download PDF sample

Rated 4.71 of 5 – based on 33 votes