Comparing, Designing, and Deploying VPNs
发表于2008/9/28 14:06:00 638人阅读
Comparing, Designing, and Deploying VPNs brings together the most popular VPN technologies for convenient reference. The book examines the real-world operation, application, design, and configuration of the following site-to-site VPNs: Layer 2 Tunneling Protocol version 3 (L2TPv3)-based Layer 2 VPNs (L2VPN); Any Transport over MPLS (AToM)-based L2VPN; MPLS Layer 3-based VPNs; and IP Security (IPsec)-based VPNs. The book covers the same details for the following remote access VPNs: Layer 2 Tunneling Protocol version 2 (L2TPv2) VPNs; L2TPv3 VPNs; IPsec-based VPNs; and Secure Socket Layer (SSL) VPNs. Through the operation, application, and configuration details offered in each chapter, youll learn how to compare and contrast the numerous types of VPN technologies, enabling you to consider all relevant VPN deployment options and select the VPN technologies that are most appropriate for your network.
Comparing, Designing, and Deploying VPNs begins with an introduction of the types of VPNs available. Subsequent chapters begin with an overview of the technology, followed by an examination of deployment pros and cons that you can use to determine if the particular VPN technology is appropriate for your network. Detailed discussion of design, deployment, and configuration make up the heart of each chapter. Appendix A offers insight into two multipoint emulated LAN services that can be deployed over a MAN or WAN: Virtual Private LAN Service (VPLS) and IP-only Private LAN Service (IPLS).
- 设计和部署互联网级别的可扩展服务--On Designing and Deploying Internet-Scale Services
- Enterprise Integration Patterns Designing, Building, and Deploying Messaging Solutions .chm
- Designing and Deploying 802.11n Wireless Networks
- On Designing and Deploying Internet-Scale Service
- Designing, Building And Deploying Messaging Solutions
- On designing and Deploying Internet-Scale Services
- Networkers2009：BRKSEC-2010 - Deploying Remote Access with SSL VPNs
- Networkers2009：BRKIPM-2102 - Deploying IP/MPLS VPNs
- Comparing LDA and SVM