Virtual private networks / Charlie Scott, Paul Wolfe, and Mike Erwin.

Title
  1. Virtual private networks / Charlie Scott, Paul Wolfe, and Mike Erwin.
Published by
  1. Sebastopol, CA : O'Reilly, 1998.
Author
  1. Scott, Charlie

Items in the library and off-site

Filter by

Displaying 1 item

StatusFormatAccessCall numberItem location
StatusFormatTextAccessRequest in advanceCall numberTK5105.875.I57 S36 1998Item locationOff-site

Details

Additional authors
  1. Erwin, Mike, 1969-
  2. Wolfe, Paul
Description
  1. xi, 177 p. : ill.; 24 cm.
Summary
  1. Tells how to plan and build a virtual private network (VPN), using a collection of technologies that creates secure connections over regular Internet lines. Starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls, then continues with detailed descriptions of how to install and use VPN technologies for Windows NT and Unix. For network administrators with LAN experience. Annotation copyrighted by Book News, Inc., Portland, OR.
Subject
  1. Internet
  2. Business enterprises > Computer networks
  3. Telecommuting
  4. Computer networks > Security measures
Contents
  1. Preface -- 1. Why Build a Virtual Private Network? -- 2. Basic VPN Technologies -- 3. Wide Area, Remote Access, and the VPN -- 4. Implementing Layer 2 Connections -- 5. Configuring and Testing Layer 2 Connections -- 6. Implementing the Alta Vista Tunnel 98 -- 7. Configuring and Testing the AltaVista Tunnel -- 8. Creating a VPN with the Unix Secure Shell -- 9. The Cisco PIX Firewall -- 10. Managing and Maintaining Your VPN -- 11. A VPN Scenario -- A. Emerging Internet Technologies -- B. Resources, Online and Otherwise -- Index.
Owning institution
  1. Harvard Library
Note
  1. "Turning the Internet into your private network"--Cover.
Bibliography (note)
  1. Includes bibliographical references and index.
Processing action (note)
  1. committed to retain