Describes how to implement virtual private networks (VPNs) based on authentication, encryption, and the exchange of security keys, as stated in the IP Security Architecture (IPSec) standard and draft documents. Scenarios explain how to set up IP tunneling via existing IP networks and the Internet to implement secure and private conversations over public networks, illustrating point-to-point, branch office, and remote user environments. An outlook is provided on further development in this area, including certificate and key management frameworks such as Internet Key Exchange. Annotation c. by Book News, Inc., Portland, Or.
"synopsis" may belong to another edition of this title.
PREFACE This book describes how to implement virtual private networks (VPNs) based on authentication, encryption, and the exchange of security keys, as defined in the IP Security Architecture (IPSec) standard and draft documents. This book will help readers to identify the benefits of VPNs and then to successfully deploy VPNs. The most commonly used encryption algorithms and handshaking protocols are explained as a general introduction to IP security. Scenarios describe how to set up IP tunnelling via existing IP networks and the Internet to effectively implement secure and private conversations over public networks. The scenarios illustrate point-to-point (client-to-server, server-to-server or client-to-client), branch office (LAN-LAN) and remote user (client-LAN) environments. An outlook is provided on further development in this area, including certificate and key management frameworks such as Internet Key Exchange (IKE), formerly referred to as ISAKMP/Oakley. This book essentially presents a subset of the information contained in the IBM Redbook: A Comprehensive Guide to Virtual Private Networks, Volume I: IBM Firewall, Server and Client Solutions, June 1998, IBM publication number SG24-5201, but also contains updated information according to the latest IPSec standards. THE AUTHORS This publication was produced by a team of specialists from around the world working at the International Technical Support Organization Raleigh Center. The leader of this project was Martin W. Murhammer. MARTIN W. MURHAMMER is a Senior I/T Availability Professional at the International Technical Support Organization Raleigh Center. Before joining the ITSO in 1996, he was a Systems Engineer in the Systems Service Center at IBM Austria. He has 13 years of experience in the personal computing environment including such areas as heterogeneous connectivity, server design, system recovery, and Internet solutions. He is a Certified OS/2 Engineer and a Certified LAN Server Engineer and has previously coauthored six redbooks during residencies at the ITSO Raleigh and Austin Centers. TIM A. BOURNE is an Advisory Software Engineer at the IBM PC Company. He has 10 years of experience in software design and development including implementation of Internet protocols, air traffic control and embedded communication systems. TAMAS GAIDOSCH is an I/T Architect in IBM Hungary. He specializes in networking software and e-business solutions in the banking industry. Tamas has five years of experience in networked computing environments and systems administration. He holds a Master's degree in Computer Science. His areas of expertise include operating systems (OS/2 LAN Server, Windows NT, AIX), networks (TCP/IP, X.25) and self-service banking software. CHARLES KUNZINGER is a Senior Engineer in Research Triangle Park, with responsibility for the technical integrity of IBM's Virtual Private Network line of products. He has worked for IBM since 1967 in various development, advanced technology, and architecture groups. For the last ten years, he has had extensive experience in the development of network layer open standards, and has represented IBM in various open standards bodies, covering such areas as interdomain routing, mobile-IP, and wireless communications, and has contributed to the development of open security standards in each of these fields. LAURA RADEMACHER is a member of the VPN Brand Management group located in Research Triangle Park, NC, and has spent much of her marketing career on the promotion of VPN technology and solutions. Prior to joining the marketing organization, she was in the TCP/IP technology area, focusing her time mainly on the education and advancement of Internet security. Laura has 15 years of experience with IBM. ANDREAS WEINFURTER is an Advisory I/T Availability Professional at the IBM System Services Center in Salzburg, Austria. After joining IBM in 1988 he worked as an instructor at the IBM education center in Vienna, where he was responsible for the PC curriculum and held mainly classes on OS/2 and networking. His primary areas of work for the past six years have been AIX and TCP/IP with a strong focus on firewalls during the last two years. Andreas holds a Master's degree in Computer Science from the Vienna University of Technology. Thanks to the following people for their invaluable contributions to this project: Tim Kearby, Karl Wozabal, Jorge Ferrari, Margaret Ticknor Shawn Walsh, Kathryn Casamento, Linda Robinson International Technical Support Organization Raleigh Center Bob Tunstall, Vach Kompella, Jaime Claypool, Steven Lingafelt Linwood Overby, Cindy Stone-Rutherford IBM Research Triangle Park Jackie Wilson, Chris Wenzel, Shay Hoffmaster IBM Austin Richard Planutis IBM Endicott
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 7833269-75
Quantity: 1 available
Seller: WeBuyBooks, Rossendale, LANCS, United Kingdom
Condition: Like New. Most items will be dispatched the same or the next working day. An apparently unread copy in perfect condition. Dust cover is intact with no nicks or tears. Spine has no signs of creasing. Pages are clean and not marred by notes or folds of any kind. Seller Inventory # wbs1434020324
Quantity: 1 available
Seller: Basi6 International, Irving, TX, U.S.A.
Condition: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Seller Inventory # ABEJUNE24-387267
Quantity: 1 available
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Seller Inventory # ABNR-148885
Quantity: 1 available
Seller: Godley Books, Hyde, United Kingdom
Soft Cover. Condition: Near Fine. No marks or inscriptions. No creasing to covers or to spine. A very clean very tight copy with bright unmarked boards and no bumping to corners. 173pp. A comprehensive guide to planning, building and configuring a virtual private network (VPN). Very scarce in the UK. We do not use stock photos, the picture displayed is of the actual book for sale. Every one of our books is in stock in the UK ready for immediate delivery. Size: 9.25 x 7 inches. Seller Inventory # 025789
Quantity: 1 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: Used. pp. xv + 174 Illus. Seller Inventory # 58136282
Quantity: 1 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: Used. pp. xv + 174. Seller Inventory # 1850374927
Quantity: 1 available
Seller: Mispah books, Redhill, SURRE, United Kingdom
Paperback. Condition: Like New. Like New. book. Seller Inventory # ERICA79001308396476
Quantity: 1 available