Creating and Implementing Virtual Private Networks

From the Publisher: Teaches the theory, implementation, guidelines, and security aspects of VPNs. Divulges the details behind encryption tools, government restrictions, firewall architectures, client/server technology, security tools, cryptography, and much more. Covers firewalls and how to use them with Cisco routers, proxy servers, TCP/IP, FTP, and more. Covers VPN architecture, advantages and disadvantages of using a VPN, and emerging technologies that may harm VPNs in the future. Provides real-life examples of installing, maintaining, and troubleshooting a VPN. Covers the best practices and implementation of Virtual Private Networks (VPNs) —currently no other book provides actual how-to information. The only documented resource on common hacker attacks against networks—plus, it provides the dos and don'ts on how to protect against them. Written for the Unix, Windows, and NT platforms. Provides handy resources and charts to evaluate data trends and perform valuable cost-benefit analysis—the first step in implementing a VPN.