Home | Amazing | Today | Tags | Publishers | Years | Search 
Comparing, Designing, and Deploying VPNs

Buy

Virtual private networks (VPNs) enable organizations to connect offices or other sites over the Internet or a service provider network and allow mobile or home-based users to enjoy the same level of productivity as those who are in the same physical location as the central network. However, with so many flavors of VPNs available, companies and providers are often hard pressed to identify, design, and deploy the VPN solutions that are most appropriate for their particular network architecture and service needs.

Comparing, Designing, and Deploying VPNs brings together the most popular VPN technologies for convenient reference. The book examines the real-world operation, application, design, and configuration of the following site-to-site VPNs: Layer 2 Tunneling Protocol version 3 (L2TPv3)-based Layer 2 VPNs (L2VPN); Any Transport over MPLS (AToM)-based L2VPN; MPLS Layer 3-based VPNs; and IP Security (IPsec)-based VPNs. The book covers the same details for the following remote access VPNs: Layer 2 Tunneling Protocol version 2 (L2TPv2) VPNs; L2TPv3 VPNs; IPsec-based VPNs; and Secure Socket Layer (SSL) VPNs. Through the operation, application, and configuration details offered in each chapter, you'll learn how to compare and contrast the numerous types of VPN technologies, enabling you to consider all relevant VPN deployment options and select the VPN technologies that are most appropriate for your network.

Comparing, Designing, and Deploying VPNs begins with an introduction of the types of VPNs available. Subsequent chapters begin with an overview of the technology, followed by an examination of deployment pros and cons that you can use to determine if the particular VPN technology is appropriate for your network. Detailed discussion of design, deployment, and configuration make up the heart of each chapter. Appendix A offers insight into two multipoint emulated LAN services that can be deployed over a MAN or WAN: Virtual Private LAN Service (VPLS) and IP-only Private LAN Service (IPLS).

If you are a network architect, network engineer, network administrator, an IT manager, or CIO involved in selecting, designing, deploying, and supporting VPNs, you'll find Comparing, Designing, and Deploying VPNs to be an indispensable reference.

This book is part of the Cisco Press® Networking Technology Series, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Unity 4.x Game Development by Example Beginner's Guide
Unity 4.x Game Development by Example Beginner's Guide

A seat-of-your-pants manual for building fun, groovy little games quickly with Unity 4.x

Overview

  • Learn the basics of the Unity 3D game engine by building five small, functional game projects
  • Explore simplification and iteration techniques that will make you more successful as a game...
Microsoft Dynamics CRM 4.0 Unleashed
Microsoft Dynamics CRM 4.0 Unleashed
Microsoft® Dynamics CRM 4.0 Unleashed presents start-to-finish guidance for planning, customizing, deploying, integrating, and managing Dynamics CRM in your unique business and technical environment. Authored by two leading Microsoft Dynamics implementers, this book systematically explains how the system...
Fundamentals of Speaker Recognition
Fundamentals of Speaker Recognition
When I was being interviewed at the handwriting recognition group of IBM T.J. Watson Research Center in December of 1990, one of the interviewers asked me why, being a mechanical engineer, I was applying for a position in that group. Well, he was an electrical engineer and somehow was under the impression that handwriting...

Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
This book comprehensively surveys the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This book will draw on the diverse expertise in optical sciences and engineering, digital...
Computational Network Application Tools for Performance Management (Asset Analytics)
Computational Network Application Tools for Performance Management (Asset Analytics)

This book explores a range of important theoretical and practical issues in the field of computational network application tools, while also presenting the latest advances and innovations using intelligent technology approaches. The main focus is on detecting and diagnosing complex application performance problems so that an optimal...

MOS 2013 Study Guide for Microsoft PowerPoint (MOS Study Guide)
MOS 2013 Study Guide for Microsoft PowerPoint (MOS Study Guide)

Demonstrate your expertise with Microsoft Office! Designed to help you practice and prepare for the 2013 PowerPoint Microsoft Office Specialist (MOS) exam, this all-in-one study guide features:

  • Full, objective-by-objective exam coverage
  • Easy-to-follow procedures and illustrations to...
©2024 LearnIT (support@pdfchm.net) - Privacy Policy