
By Richard Deal
Very dissatisfied. i've got a 950 web page publication that doesn't hide establishing an IOS router for distant entry utilizing PPTP or L2TP. WTF? Heck - that is why i purchased this dear publication. in case you have deep wallet and will purchase no matter what cisco equipment you love then this booklet will most probably introduce you to many attainable VPN options. yet there seems a bias within the booklet towards huge company recommendations - with very little attention given to SOHO and small companies. many people make do with the assets that we've got on hand and cannot simply exit a purchase stuff as the writer thinks a distant entry concentrator will be "best." I nonetheless cannot think that he does not disguise configuring IOS for entry by way of home windows PPTP or L2TP consumers. i am surprised. With this obvious omission i will not support yet ask yourself concerning the completeness of the opposite content material. Thumbs down.
Read or Download The Complete Cisco VPN Configuration Guide PDF
Similar system administration books
Java Performance and Scalability: Server-Side Programming Techniques
This ebook was once written with one objective in brain: to supply Java programmers with the services had to construct effective, scalable Java code. the writer stocks his adventure in server-side functionality tuning via measured functionality checks, known as optimizations. each one optimization discusses concepts to enhance the functionality and scalability of your code.
Deploying Microsoft Forefront Protection 2010 for Exchange Server (It Professional Series)
Get concentrated, real-world suggestions for making plans and enforcing leading edge security for trade Server--and aid defend firm e mail from viruses, unsolicited mail, phishing, and coverage violations. Guided through key individuals of the Microsoft leading edge staff, you will delve into process parts, positive aspects, and features, and step via crucial making plans and layout issues.
Extra resources for The Complete Cisco VPN Configuration Guide
Sample text
For example, you could use an SSL VPN solution to protect data between two devices; however, the main limitation of SSL VPNs is that they primarily provide application layer protection, which typically is limited to web browser-based connections, and specific applications the vendor has written code for, to tunnel through the SSL VPN. Their advantage, however, is that they can use an existing web browser on the user's desktop. IPsec, on the other hand, provides protection at the network layer; therefore, any IP traffic can be protected between peer devices.
However, with an asymmetric keying encryption algorithm, a public key is used to encrypt the data and the corresponding private key is used to decrypt it. We have seen the advantage of asymmetric key algorithms for encryption: you can easily share the public key across a public network and have a remote device use this key to encrypt data sent to you. Even if an attacker sees the public key, it won't do him any good because only the corresponding private key can decrypt the data. However, because the complexity of the encryption/decryption algorithm makes asymmetric keying with encryption a very slow process, asymmetric keying typically is reserved for identity authentication and key sharing, and symmetric keying is used for data encryption.
This connection type is usually deployed where only a specific type of traffic between two devices needs to be protected. An example of device-to-device connection includes backing up the configuration file on a Cisco router to a TFTP server, sending SNMPv2 traffic from a managed device, like a Catalyst switch, to an SNMP management server, or sending logging traffic from a PIX security appliance to a syslog server. One concern of device-to-device connections is that they place an extra burden on the VPN endpoint device.