IPSec Authentication and Authorization Models - Chapter 4 of IPSec VPN Design

IPSec VPN Design by Vijay Bollapragada, Mohamed Khalid and Scott Wainner presents a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. Divided into three parts, the book provides a solid understanding of design and architectural issues of large-scale, secure VPN solutions. Chapter four, excerpted here, covers IPSec features and mechanisms that are primarily targeted at the authentication of remote access users. You'll learn about XAUTH, which provides extended authentication for IPSec telecommuters by using authentication schemes such as RADIUS.

IPSec VPN Design
 

IPSec VPN Design by Vijay Bollapragada, Mohamed Khalid and Scott Wainner presents a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. Divided into three parts, the book provides a solid understanding of design and architectural issues of large-scale, secure VPN solutions.

Chapter four, excerpted here, covers IPSec features and mechanisms that are primarily targeted at the authentication of remote access users. You'll learn about XAUTH, which provides extended authentication for IPSec telecommuters.

Read the rest of the excerpt in this PDF.

 


(Reproduced from the book IPSec VPN Design, ISBN 1587051117, Copyright 2005, Cisco Systems, Inc. Reproduced by permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses. Visit www.ciscopress.com for a detailed description and to learn how to purchase this title.)

This was last published in January 2006

Dig Deeper on Networking Book Excerpts

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close