SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Substantial interest in VPN has been created by concerns for privacy and data protection. You, the administrator must be aware of security concepts and network designs, and yet, customers require flexible network environments that will satisfy the needs of today's computer users. You must support laptop users, home LAN environments, complex branch offices, and more--all within a secure and effective network design. The way you implement VPNs in Windows 2000 is different than any other operating system. Windows 2000 Virtual Private Networking will cover all aspects of both the tunnel client. Microsoft is using PPTP, L2TP and IPSec all in this one product and the configuration of both tunnel and transport configuration can be very complex. This book covers what you, the network designer can do with this capability; new VPN features that can affect Active Directory replication; network address translation; Proxy and more will be covered in depth.
Click below for Sample Chapter related to this title:
1578702461.pdf
(NOTE: Each chapter concludes with a Summary.)
Preface.
Introduction.
1. What Is a Virtual Private Network?
History of Virtual Private Networks. How a Virtual Private Network Works. Alternative Services. Common Uses of Virtual Private Networks. Other Benefits of Virtual Private Networks.
Terminology. Design Considerations. Virtual Private Network Deployment. Network Design Concepts with Tunneling.
Active Directory. PPTP. L2TP. IPSec. Internet Key Exchange (IKE). NAT. Connection Manager. Certificate Server. Dynamic DNS. Highly Configurable Network Traffic. Easier Router Configuration.
How PPTP Works. PPTP Security. Performance Gains.
What Is a Certificate Server? Digital Signatures. Certificate Authority. Certificate Enrollment. Certificate Verification. Certificate Revocation. Certificate Storage Model. Implementing Certificate Server for Virtual Private Networks.
IPSec Communication. Choosing an IPSec Environment. Bringing the Whole IPSec Picture Together.
Goals for Windows 2000 L2TP/IPSec. L2TP versus PPTP. L2TP Implementation Details. L2TP Communications in Detail. Internet Key Exchange Settings. Key Exchange Methods (H3). Power Management. L2TP/IPSec Procedures.
Proxy Server. Proxy Server Functions: Speed and Security. Network Address Translation. Firewalls. Edge Servers. Windows 2000 Network Address Translation. Various Server-Side Network Designs. Various Client-Side Network Designs. Summary of Distributed Network Designs. NAT and Proxy Server Configuration. Setting Up NAT with RRAS. Sharing a VPN Link.
Connection Manager. Remote Access Policies. Windows 2000 Remote Access Policy. Internet Authentication Service (IAS).
Windows 2000 Routing. Client-Side Routing. Automatic Private IP Addressing (APIPA). Tunnels and Routing.
Name Resolution for Tunnel Clients. Name Resolution for Home LAN/Branch Office. Name Resolution for a VPN-Based Active Directory Environment. Relationship Between the Branch Office Name Servers.
Replication. Single Master Replication and VPNs. Optimization. Site Design. Deploying the AD. The HappyVPN Model.
The Early Years. ISPs. Private Networks. OSI Reference Model. VPN-Related RFCs.
Troubleshooting Factors. Common Issues and Troubleshooting Tips.
Network Setup. Windows 2000 Security Policy Configuration. Cisco IPSec Configuration. Testing. Summary.
Predicting VPN and Windows Trends.