HAPPY BOOKSGIVING
Use code BOOKSGIVING during checkout to save 40%-55% on books and eBooks. Shop now.
Register your product to gain access to bonus material or receive a coupon.
This PDF will be accessible from your Account page after purchase and requires PDF reading software, such as Acrobat® Reader®.
The eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution
With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs.
Part I, “VPNs,” introduces the topic of VPNs and discusses today’s main technologies, including IPsec. It also spends an entire chapter on SSL VPNs, the newest VPN technology and one that Cisco has placed particular emphasis on since 2003. Part II, “Concentrators,” provides detail on today’s concentrator products and covers site-to-site and remote-access connection types with attention on IPsec and WebVPN. Part III covers the Cisco VPN Client versions 3.x and 4.x along with the Cisco3002 Hardware Client. Cisco IOS® routers are the topic of Part IV, covering scalable VPNs with Dynamic Multipoint VPN, router certificate authorities, and router remote access solutions. Part V explains Cisco PIX and Cisco ASA security appliances and their roles in VPN connectivity, including remote access and site-to-site connections. In Part VI, a case study shows how a VPN solution is best implemented in the real world using a variety of Cisco VPN products in a sample network.
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
Part I VPNs
Chapter 1 Overview of VPNs
Chapter 2 VPN Technologies
Chapter 3 IPsec
Chapter 4 PPTP and L2TP
Chapter 5 SSL VPNs
Part II Concentrators
Chapter 6 Concentrator Product Information
Chapter 7 Concentrator Remote Access Connections with IPsec
Chapter 8 Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
Chapter 9 Concentrator Site-to-Site Connections
Chapter 10 Concentrator Management
Chapter 11 Verifying and Troubleshooting Concentrator Connections
Part III Clients
Chapter 12 Cisco VPN Software Client
Chapter 13 Windows Software Client
Chapter 14 3002 Hardware Client
Part IV IOS Routers
Chapter 15 Router Product Information
Chapter 16 Router ISAKMP/IKE Phase 1 Connectivity
Chapter 17 Router Site-to-Site Connections
Chapter 18 Router Remote Access Connections
Chapter 19 Troubleshooting Router Connections
Part V PIX Firewalls
Chapter 20 PIX and ASA Product Information
Chapter 21 PIX and ASA Site-to-Site Connections
Chapter 22 PIX and ASA Remote Access Connections
Chapter 23 Troubleshooting PIX and ASA Connections
Part VI Case Study
Chapter 24 Case Study