BookSee.org
Booksee.org
Главная

The Complete Cisco VPN Configuration Guide

Обложка книги The Complete Cisco VPN Configuration Guide

The Complete Cisco VPN Configuration Guide

The definitive guide to building a complete VPN solution with Cisco routers, PIX Firewalls, concentrators, and remote access clients* A complete resource for understanding VPN components and VPN design issues* Understand state-of-the-art VPN connection types like IPSec, PPTP, and L2TP* Real-world case studies detail implementation of complex VPN configurations on Cisco devices including routers, PIX Firewalls, concentrators, and software and hardware clientsVirtual Private Networks (VPNs) are the most popular component in a company's remote access solution. With increased use of Internet connectivity and less reliance on private WAN networks, VPNs provide a much-needed secure method of transferring critical information. Vendors like Cisco Systems continually upgrade products to provide features that take advantage of advances in standards and protocols like IPSec and L2TP (Layer 2 Tunneling Protocol). Cisco VPN equipment is at the center of this access revolution; nearly every enterprise network contains Cisco gear and most of this equipment supports VPN functionality. As Cisco integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. Engineers need to know how to set up various VPN deployments using Cisco equipment. Currently, there is no single book that covers how to deploy VPNs using all of Cisco's VPN-capable products, including IOS routers, PIX Firewalls, 3000 series Concentrators, and the Cisco software and hardware clients. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco VPN products, describing the details of setting up IPSec and SSL connections on any type of Cisco device, including concentrators, clients, routers, or the PIX Firewall. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN design.
Ссылка удалена правообладателем
----
The book removed at the request of the copyright holder.
Популярные книги за неделю:
Только что пользователи скачали эти книги: