PKI uncovered certificate-based security solutions for next-generation networks

The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know Covers the entire PKI project lifecycle, making complex...

Descripción completa

Detalles Bibliográficos
Autores principales: Karamanian, Andre (-), Tenneti, Srinivas (Autor), Dessart, Francois
Autor Corporativo: Books24x7, Inc (-)
Otros Autores: Teichmann, Alex (Revisador), Jarzynka, Piotr
Formato: Libro electrónico
Idioma:Inglés
Publicado: Indianapolis, Ind. : Cisco Press c2011
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628877906719
Tabla de Contenidos:
  • Cover
  • Contents
  • Introduction
  • Part I: Core Concepts
  • Chapter 1 Crypto Refresh
  • Confidentiality, Integrity, Authenticity, Nonrepudiation
  • Asymmetric Encryption
  • Other Crypto Functions
  • Internet Key Exchange (IKE)
  • Device Configuration: Certificates
  • Summary
  • Chapter 2 Understanding PKI Building Blocks
  • Certificates
  • Certification Authority (CA)
  • Subordinate Certification Authorities (Sub-CA)
  • Registration Authority (RA)
  • Endpoint Entities: Users and Devices
  • Key and Certificate Storage
  • Summary
  • Chapter 3 PKI Processes and Procedures
  • Enrollment
  • Certificate Expiration and Renewal
  • Certificate Verification and Enforcement
  • PKI Resiliency
  • Summary
  • Chapter 4 Troubleshooting
  • Keying Material Generation
  • Enrollment Process
  • Certificate Use and Validation
  • Troubleshooting Flow Charts
  • Summary
  • Part II: Design and Solutions
  • Chapter 5 Generic PKI Designs
  • Basic Design with Flat CA Architecture
  • Hierarchical Architecture
  • Hierarchical Architecture Without Chaining
  • Hierarchical Architecture with Chaining
  • Summary
  • Chapter 6 Integration in Large-Scale Site-to-Site VPN Solutions
  • How Do VPN Technologies Use PKI as a Service?
  • IKE Using Digital Certificates
  • PKI Design and Leading Practices
  • GETVPN PKI Design and Leading Practices
  • Summary
  • Chapter 7 Integration in Remote Access VPN Solutions
  • Cisco IPsec VPN Remote Access
  • Cisco VPN Client Using Digital Certificates
  • SSL VPN Access
  • Troubleshooting the AnyConnect Solution
  • Summary
  • Chapter 8 Using 802.1X Certificates in Identity-Based Networking
  • EAP-TLS: Certificate-Based 802.1x
  • Summary
  • Chapter 9 PKI in Unified Communications
  • PKI Concepts in Cisco UC
  • Certificates Distribution
  • Applications
  • Summary
  • Part III: Case Studies
  • Chapter 10 Understanding Cisco Virtual Office.
  • CVO PKI Highlights
  • Summary
  • Chapter 11 Deploying VPNs with PKI Using Cisco Security Manager
  • Cisco ASA IPsec VPN Remote Access
  • Deploying DMVPN Using CSM
  • GETVPN Deployment Using CSM
  • Summary
  • Index.