ABSTRACT

What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become. A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security. Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies. After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.

chapter 1|18 pages

Getting Started

chapter 2|32 pages

Technical Primer

chapter 3|10 pages

IP Security Primer

chapter 4|22 pages

Cryptography

chapter 5|18 pages

Implementation Theory

chapter 6|10 pages

Authentication

chapter 7|38 pages

IPSec Architecture

chapter 8|10 pages

Security Protocols

chapter 9|50 pages

Key Management

chapter 10|18 pages

IKE in Action

chapter 11|14 pages

Areas of Interest within IKE

chapter 12|10 pages

Security Policies and the Security of VPNs

chapter 13|42 pages

Implementation Considerations

chapter 14|14 pages

Product Evaluation

chapter 15|16 pages

Report on IPSec