Building VPNs: With IPSec and MPLS - Chapter 5

Chapter 5 focuses on the design of scalable IPSec VPNs using the hub-and-spoke topology.

Chapter 5 - Deploying IPSec VPN in the Enterprise

This excerpt is reprinted with permission from McGraw-Hill, copyright 2003. For more information or to order the book, click here.

Assembling a fully functional IPSec or MPLS VPN isn't easy. With so little information available it can be like trying to build a bicycle when you have all the components, but no idea what the final product should look like. Only Building VPNs shows, in a clear, step-by-step fashion, how to build VPNs from scratch with IPSec and MPLS.

Chapter 5 focuses on the design of scalable IPSec VPNs using the hub-and-spoke topology.

To obtain Chapter 5, click here

Dig Deeper on Network Security Monitoring and Analysis

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close