SearchNetworking.com Chapter of the Week
Now you can find a new chapter download each week on SearchNetworking.com! This month you'll find an assortment of chapters on virtual private networks.
Check out this week's featured book:
You can download this week's chapter now. Be sure to bookmark this Chapter of the Week page and check back each week to access our upcoming chapters.
Building VPNs: With IPSec and MPLS - Chapter 5
Assembling a fully functional IPsec or MPLS VPN isn't easy. With so little information available it can be like trying to build a bicycle when you have all the components, but no idea what the final product should look like. Only Building VPNs shows, in a clear, step-by-step fashion, how to build VPNs from scratch with IPsec and MPLS.
Chapter five focuses on the design of scalable IPsec VPNs using the hub-and-spoke topology. (This excerpt is reprinted with permission from The McGraw-Hill Companies, Inc., copyright 2003)
Building VPNs: With IPsec and MPLS - Chapter 1
Chapter one addresses three types of VPNs: remote access, site-to-site, and firewall-based (a site-to-site variation). The variation between remote access and site-to-site VPNs will become more ambiguous as new devices such as hardware VPN clients, become more prevalent. These appear as a single device accessing the network, albeit there may be a network with several devices behind it. In all cases, the VPN comprises two endpoints that may be represented by routers, firewalls, client workstations, or servers. (This excerpt is reprinted with permission from The McGraw-Hill Companies, Inc., copyright 2003)
CCSP Cisco Secure VPN Exam Certification Guide, Chapter 4
Featured June 7-11
Installation and configuration of Cisco VPN 3000 series concentrators and VPN 3002 hardware clients are critical tasks in today's network environments, especially as reliance on the public Internet as an extension of business networks increases. Whether you are seeking a Cisco VPN specialist certification, the full-fledged CCSP certification, or just boning up in general, learning about secure VPNs will help you keep your company's network safe while meeting its business needs. This chapter excerpt focuses on remote access using preshared keys, configuration of the 3000 concentrator, configuring users and user groups, and configuring the IPsec Windows client. (This excerpt is reprinted with permission from Cisco Press, copyright 2003-2004)
Troubleshooting Virtual Private Networks (VPN), Chapter 6
Featured June 1-4
MPLS VPNs are relatively complex, but by adopting an end-to-end, step-by-step approach, troubleshooting can be relatively fast and efficient. This chapter focuses on the process of troubleshooting MPLS VPNs and brakes troubleshooting down into two basic elements: troubleshooting route advertisement between the customer sites and troubleshooting the LSP across the provider backbone. (This excerpt is reprinted with permission from Cisco Press, copyright 2003-2004)
Dig deeper on Remote access