Building Linux Virtual Private Networks
  • Section I: Virtual Private Networks

    • Chapter 1: Introduction to VPNs

      • What is a VPN
      • VPN Topologies
      • Advantages and Disadvantages of VPNs
      • Making VPNs Secure
      • Making the Decision On Using a VPN
      • VPN Groups
      • VPN Protocols
      • Summary

    • Chapter 2: VPN Fundamentals

      • Our conventions
      • Considerations
      • VPN and Firewall Interaction
      • Networking Issues
      • Logging
      • Performance
      • Summary

  • Section II: Implementing Standard VPN Protocols

    • Chapter 3: Building a VPN with SSH and PPP

      • PPP-Over-SSH Overview
      • Setting up PPP over SSH manually
      • Increasing the Security of your VPN
      • VPN Scripts
      • Troubleshooting
      • Limitations
      • Summary

    • Chapter 4: Building a VPN with SSL/TLS and PPP

      • PPP-Over-SSL Overview
      • Setting up PPP over SSL/TLS manually
      • VPN Scripts
      • Troubleshooting
      • Limitations
      • Summary

    • Chapter 5: IPSec

      • IPSec Architecture, Components, and Concepts
      • Creating a VPN with IPSec
      • IPSec Road Warriors
      • Interoperability of IPSec Implementations
      • Opportunistic Encryption
      • Limitations and Conclusions
      • Summary

    • Chapter 6: FreeS/WAN

      • Overview
      • Planning your VPN
      • FreeS/WAN Compilation
      • Configuring FreeS/WAN
      • Running and Troubleshooting FreeS/WAN
      • Summary

    • Chapter 7: PPTP

      • The PPTP Protocol
      • Installing ppp-mppc
      • Building a PPTP VPN Client
      • Building a PPTP VPN Server
      • Troubleshooting
      • Summary

  • Section III: Implementing Non-standard VPN protocols

    • Chapter 8: VTun

      • Overview of VTun
      • Dependencies
      • Compiling VTun
      • VTun Configuration
      • Troubleshooting
      • Compatibility
      • Summary

    • Chapter 9: cIPe

      • Overview of cIPe
      • Installation
      • CIPE Configuration
      • Using CIPE
      • Limitations
      • Summary

    • Chapter 10: tinc

      • An Overview of tinc
      • Installation
      • Configuration
      • Using tinc
      • Troubleshooting
      • Limitations

  • Appendices

    • Appendix A: Commercial Solutions
    • Appendix B: Selecting a cipher
    • Appendix C: Glossary

Home
Contents
Authors
Reviews
Errata
Colophon
Source Code
Sample Chapter
Suggested Reading
Purchase

New Riders Publishing