Windows 2000 Virtual Private Networking (VPN) (Circle)

個数:

Windows 2000 Virtual Private Networking (VPN) (Circle)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 408 p.
  • 言語 ENG
  • 商品コード 9781578702466
  • DDC分類 005.4469

Full Description

Substantial interest in VPN has been created by concerns for privacy and data protection. You, the administrator must be aware of security concepts and network designs, and yet, customers require flexible network environments that will satisfy the needs of today's computer users. You must support laptop users, home LAN environments, complex branch offices, and more--all within a secure and effective network design. The way you implement VPNs in Windows 2000 is different than any other operating system. Windows 2000 Virtual Private Networking will cover all aspects of both the tunnel client. Microsoft is using PPTP, L2TP and IPSec all in this one product and the configuration of both tunnel and transport configuration can be very complex. This book covers what you, the network designer can do with this capability; new VPN features that can affect Active Directory replication; network address translation; Proxy and more will be covered in depth.

Contents

(NOTE: Each chapter concludes with a Summary.)

Preface.


Introduction.


1. What Is a Virtual Private Network?


History of Virtual Private Networks. How a Virtual Private Network Works. Alternative Services. Common Uses of Virtual Private Networks. Other Benefits of Virtual Private Networks.



2. Basic Virtual Private Network Deployment.


Terminology. Design Considerations. Virtual Private Network Deployment. Network Design Concepts with Tunneling.



3. VPN Features in Windows 2000.


Active Directory. PPTP. L2TP. IPSec. Internet Key Exchange (IKE). NAT. Connection Manager. Certificate Server. Dynamic DNS. Highly Configurable Network Traffic. Easier Router Configuration.



4. Point-to-Point Tunneling Protocol (PPTP).


How PPTP Works. PPTP Security. Performance Gains.



5. Certificates.


What Is a Certificate Server? Digital Signatures. Certificate Authority. Certificate Enrollment. Certificate Verification. Certificate Revocation. Certificate Storage Model. Implementing Certificate Server for Virtual Private Networks.



6. Internet Protocol Security (IPSec).


IPSec Communication. Choosing an IPSec Environment. Bringing the Whole IPSec Picture Together.



7. Layer 2 Tunneling Protocol (L2TP).


Goals for Windows 2000 L2TP/IPSec. L2TP versus PPTP. L2TP Implementation Details. L2TP Communications in Detail. Internet Key Exchange Settings. Key Exchange Methods (H3). Power Management. L2TP/IPSec Procedures.



8. NAT and Proxy Servers.


Proxy Server. Proxy Server Functions: Speed and Security. Network Address Translation. Firewalls. Edge Servers. Windows 2000 Network Address Translation. Various Server-Side Network Designs. Various Client-Side Network Designs. Summary of Distributed Network Designs. NAT and Proxy Server Configuration. Setting Up NAT with RRAS. Sharing a VPN Link.



9. Connection Manager, Remote Access Policy, and IAS.


Connection Manager. Remote Access Policies. Windows 2000 Remote Access Policy. Internet Authentication Service (IAS).



10. Routing and Filtering.


Windows 2000 Routing. Client-Side Routing. Automatic Private IP Addressing (APIPA). Tunnels and Routing.



11. Name Resolution in Windows 2000.


Name Resolution for Tunnel Clients. Name Resolution for Home LAN/Branch Office. Name Resolution for a VPN-Based Active Directory Environment. Relationship Between the Branch Office Name Servers.



12. Active Directory Design in VPNs.


Replication. Single Master Replication and VPNs. Optimization. Site Design. Deploying the AD. The HappyVPN Model.



Appendix A. History and Context of Virtual Private Networking.


The Early Years. ISPs. Private Networks. OSI Reference Model. VPN-Related RFCs.



Appendix B. Troubleshooting.


Troubleshooting Factors. Common Issues and Troubleshooting Tips.



Appendix C. Windows 2000 to Cisco IOS IPSec Connectivity.


Network Setup. Windows 2000 Security Policy Configuration. Cisco IPSec Configuration. Testing. Summary.



Appendix D. VPN and Network Futures.


Predicting VPN and Windows Trends.



Index.