Building VPNs: With IPSec and MPLS - Chapter 5

Chapter 5 focuses on the design of scalable IPSec VPNs using the hub-and-spoke topology.

Chapter 5 - Deploying IPSec VPN in the Enterprise

This excerpt is reprinted with permission from McGraw-Hill, copyright 2003. For more information or to order the book, click here.

Assembling a fully functional IPSec or MPLS VPN isn't easy. With so little information available it can be like trying to build a bicycle when you have all the components, but no idea what the final product should look like. Only Building VPNs shows, in a clear, step-by-step fashion, how to build VPNs from scratch with IPSec and MPLS.

Chapter 5 focuses on the design of scalable IPSec VPNs using the hub-and-spoke topology.

To obtain Chapter 5, click here

This was first published in September 2003

Dig deeper on Network Security Monitoring and Analysis

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close