Problem solve Get help with specific problems with your technologies, process and projects.

Building VPNs: With IPSec and MPLS - Chapter 1

Chapter 1 addresses three types of VPNs: remote access, site-to-site, and firewall-based (a site-to-site variation).

Chapter 1 - The VPN Overview

This excerpt is reprinted with permission from McGraw-Hill, copyright 2003. For more information or to order the book, click here.

Assembling a fully functional IPSec or MPLS VPN isn't easy. With so little information available it can be like trying to build a bicycle when you have all the components, but no idea what the final product should look like. Only Building VPNs shows, in a clear, step-by-step fashion, how to build VPNs from scratch with IPSec and MPLS.

Chapter 1 addresses three types of VPNs: remote access, site-to-site, and firewall-based (a site-to-site variation). The variation between remote access and site-to-site VPNs will become more ambiguous as new devices such as hardware VPN clients, become more prevalent. These appear as a single device accessing the network, albeit there may be a network with several devices behind it. In all cases, the VPN comprises two endpoints that may be represented by routers, firewalls, client workstations, or servers.

To obtain Chapter 1, click here

This was last published in September 2003

Dig Deeper on Network Security

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close