| |
|
- Section I: Virtual Private Networks
- Chapter 1: Introduction to VPNs
- What is a VPN
- VPN Topologies
- Advantages and Disadvantages of VPNs
- Making VPNs Secure
- Making the Decision On Using a VPN
- VPN Groups
- VPN Protocols
- Summary
- Chapter 2: VPN Fundamentals
- Our conventions
- Considerations
- VPN and Firewall Interaction
- Networking Issues
- Logging
- Performance
- Summary
- Section II: Implementing Standard VPN Protocols
- Chapter 3: Building a VPN with SSH and PPP
- PPP-Over-SSH Overview
- Setting up PPP over SSH manually
- Increasing the Security of your VPN
- VPN Scripts
- Troubleshooting
- Limitations
- Summary
- Chapter 4: Building a VPN with SSL/TLS and PPP
- PPP-Over-SSL Overview
- Setting up PPP over SSL/TLS manually
- VPN Scripts
- Troubleshooting
- Limitations
- Summary
- Chapter 5: IPSec
- IPSec Architecture, Components, and Concepts
- Creating a VPN with IPSec
- IPSec Road Warriors
- Interoperability of IPSec Implementations
- Opportunistic Encryption
- Limitations and Conclusions
- Summary
- Chapter 6: FreeS/WAN
- Overview
- Planning your VPN
- FreeS/WAN Compilation
- Configuring FreeS/WAN
- Running and Troubleshooting FreeS/WAN
- Summary
- Chapter 7: PPTP
- The PPTP Protocol
- Installing ppp-mppc
- Building a PPTP VPN Client
- Building a PPTP VPN Server
- Troubleshooting
- Summary
- Section III: Implementing Non-standard VPN protocols
- Chapter 8: VTun
- Overview of VTun
- Dependencies
- Compiling VTun
- VTun Configuration
- Troubleshooting
- Compatibility
- Summary
- Chapter 9: cIPe
- Overview of cIPe
- Installation
- CIPE Configuration
- Using CIPE
- Limitations
- Summary
- Chapter 10: tinc
- An Overview of tinc
- Installation
- Configuration
- Using tinc
- Troubleshooting
- Limitations
- Appendices
- Appendix A: Commercial Solutions
- Appendix B: Selecting a cipher
- Appendix C: Glossary
|
|
|