Building VPNs: With IPSec and MPLS - Chapter 5

Chapter 5 focuses on the design of scalable IPSec VPNs using the hub-and-spoke topology.

Chapter 5 - Deploying IPSec VPN in the Enterprise

This excerpt is reprinted with permission from McGraw-Hill, copyright 2003. For more information or to order the book, click here.

Assembling a fully functional IPSec or MPLS VPN isn't easy. With so little information available it can be like trying to build a bicycle when you have all the components, but no idea what the final product should look like. Only Building VPNs shows, in a clear, step-by-step fashion, how to build VPNs from scratch with IPSec and MPLS.

Chapter 5 focuses on the design of scalable IPSec VPNs using the hub-and-spoke topology.

To obtain Chapter 5, click here

This was last published in September 2003

Dig Deeper on Network Security Monitoring and Analysis

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close