Implementing Cisco VPNs Contributor(s): Quiggle, Adam (Conductor) |
|
ISBN: 0072130482 ISBN-13: 9780072130485 Publisher: McGraw-Hill/Osborne Media OUR PRICE: $57.90 Product Type: Paperback Published: February 2001 Annotation: Set up, configure, and troubleshoot Cisco-based virtual private networks. When it comes to communicating over the Internet, it is critical that the networking technology you're working with is reliable, secure, and will perform smoothly. This step-by-step implementation guide will show you exactly how to implement Cisco-based VPNs effectively. Beginning with an overview of VPN basics--including encryption and authentication--the book covers IPSec, L2TP and other tunneling protocols. Also covered is configuring Windows native support for VPN technology. This hands-on book offers complete and detailed information for understanding and implementing Cisco-based VPN technology. Each chapter is organized in the same easy-to-follow format: a technology overview, IOS version specific commands, and finally multiple case studies outlining effective use of this technology. With this practical guide you'll be able to:
No other book gives you both practical techniques and in-depth Cisco-specific information. Whether you need to learn about VPNs in preparation for the difficult CCIE exam or if you want to implement a secure virtual private network using Cisco technology, then this is the only book you need. |
Additional Information |
BISAC Categories: - Computers | Networking - Local Area Networks (lans) - Technology & Engineering | Telecommunications |
Dewey: 004.68 |
LCCN: 2001269337 |
Series: McGraw-Hill Technical Expert |
Physical Information: 1.27" H x 7.5" W x 9.25" (2.34 lbs) 601 pages |
Descriptions, Reviews, Etc. |
Publisher Description: VPNs (Virtual Private Networks) allow for secure communications over publicly shared infrastructure, such as the Internet. This is a guide to implementing Cisco private networks, as well as providing an overview of VPNs. The guide contains blueprints that show the reader how the technology fits into the network architecture. Each chapter provides a technical overview of the technology, the commands and hardware required to implement the technology and a case study. |