Imagen del editor
Imagen no disponible

Building and Integrating Virtual Private Networks with Openswan

Ken Bantoft,Paul Wouters

ISBN 10: 9350237008 / ISBN 13: 9789350237007
Editorial: Shroff Publishers/Packt, 2012
Nuevos Condición: New Encuadernación de tapa blanda
Librería: BookVistas (New Delhi, DELHI, India)

Librería en AbeBooks desde: 24 de noviembre de 2010

Cantidad: > 20

Comprar nuevo
Precio: EUR 12,93 Convertir moneda
Gastos de envío: EUR 3,99 De India a Estados Unidos de America Destinos, gastos y plazos de envío
Añadir al carrito


What you will learn from this book Chapter 1 presents some historical context of IPsec and Openswan, and discusses the legal aspects about using and selling cryptography such as Openswan, and discusses some of the aspects of weighing encryption privacy and law enforcement. Chapter 2 explains in non-mathematical terms how the IPsec protocols work. It is written especially with the system administrator in mind, and should appeal to both experts and beginners in the world of cryptography. Chapter 3 contains all you need to know to install Openswan on your Linux distribution. It covers installing available binary packages, as well as how to build Openswan from source. It also guides you through the options your kernel needs to support, and helps you choose between the two IPsec stacks that are currently available - KLIPS and NETKEY. Read chapter 3: "Building and Installing Openswan" (PDF - 348KB) Chapter 4 is a step by step tutorial on how to configure the most common type of VPN connections using Openswan. These include net-to-net, host-to-net, roaming users and head office to branch offices. In other words, all the possible Openswan-to-Openswan connections. It also discusses commonly deployed third party scenarios, including Cisco implementations using Aggressive Mode and XAUTH with Openswan as the IPsec client. Chapter 5 introduces X.509 certificate based authentication for IPsec. It explains how X.509 certificates work, how to generate them for Linux, Windows and MacOSX clients, and how to run your own Certificate Agency. Chapter 6 explains the Openswan feature called Opportunistic Encryption ("OE"). This method of allows one to automate host-to-host encryption for machines without any specific configuration by the end-user. Using OE, anyone can use IPsec protected connections to your servers without even realizing they are using IPsec. The goal of OE is to make IPsec the de-facto standard for all communication on the internet. Chapter 7 goes right down to the packet level and discusses common problems that you might face on your IPsec gateway. These include special firewalling rules, handling broken IPsec implementations and the various MTU related issues that can come up. Chapter 8 discusses IPsec from the two most popular end-user Operating Systems: Microsoft Windows and Apple MacOSX. It helps you decide on whether you would prefer X.509 certificate based IPsec, or the less complex L2TP/IPsec. It has a step by step guide on how to setup L2TP on your Openswan VPN server. It also explains how to configure X.509 or L2TP on your Microsoft Windows or Apple MacOSX clients, and includes all the screenshots to guide your way. It closes with a description on how to configure commonly used third-party software packages for Openswan. Chapter 9 deals with getting Openswan to properly interoperate with third party IPsec VPN servers such as Cisco, Checkpoint, Netscreen, Watchguard and various DSL based modem/router appliances commonly used by end-users. Chapter 10 explores how to use IPsec to encrypt all traffic between local machines. It specifically focuses on 802.11 type wireless connections, but it applies in general to all LAN based computers. It discusses the Xelerance designed IPsec deployment scenario called WaveSEC: the implementation used at IETF, BlackHat and DefCon to encrypt their wireless networks. Chapter 11 discusses the advanced use of Openswan. It discusses how to setup a proper fail-over VPN server with Openswan, and discusses large enterprise deployments bottlenecks, as well as how to deal with BGP and OSPF using IPsec and Openswan. Chapter 12 is the culmination of two years of end-user support on the public mailing lists. It discusses the common mistakes and issues that people who are not working with IPsec on a daily basis tend to run into. Unless you Printed Pages: 372. N° de ref. de la librería 55793

Hacer una pregunta a la librería

Detalles bibliográficos

Título: Building and Integrating Virtual Private ...

Editorial: Shroff Publishers/Packt

Año de publicación: 2012

Encuadernación: Softcover

Condición del libro:New

Descripción de la librería

Ver la página web de la librería

Condiciones de venta:

All books are new. We accept payments by the following methods:

  1. Credit Card: Visa, MasterCard, or American Express.
  2. PayPal.
  3. Bank Draft or Banker's Cheque.
  4. Bank/Wire Transfer.

Cheques may be made payable to BookVistas.

Books are shipped by DHL, FedEx, Aramex, Registered Air Mail, or Registered SAL (Surface Air

Condiciones de envío:

Shipping costs are based on books weighing 2.2 LB, or 1 KG. If your book order is heavy or oversized, we may contact you to let you know extra shipping is required.

Todos los libros de esta librería

Métodos de pago
aceptados por la librería

Visa Mastercard American Express Carte Bleue

PayPal Letra de Cambio Transferencia Bancaria