Mostrando 1 - 20 Resultados de 26 Para Buscar '"L2TP"', tiempo de consulta: 0.15s Limitar resultados
  1. 1
    por Shea, Richard, 1972-
    Publicado 2000
    Libro
  2. 2
    por Mervana, Sanjeev
    Publicado 2002
    “…It covers both access encapsulations such as bridging, PPPoA, PPPoE, and routing, as well as core architectures such as IP, L2TP, MPLS/VPN, and ATM. Because it focuses on end-to-end solutions, Design and Implementation of DSL-Based Access Solutions talks about how to do mass provisioning of subscribers and how to manage networks in the most efficient way. …”
    Libro electrónico
  3. 3
    por Nedeltchev, Plamen
    Publicado 2003
    “…A guide to understanding the troubleshooting tools, commands, and methodologies that enable reliable performance for remote access services Gain a solid grasp of enterprise telecommunications technology fundamentals, including service options and clocking, line coding, and framing in carrier systems Understand how network traffic is handled by carriers and service providers Examine a layer-by-layer, systematic approach to troubleshooting issues Design, configure, and troubleshoot T1 and PRI circuits, text and PPP dial-in and dial-out services, and Cisco AS5000 Access Servers Design, configure, and troubleshoot ISDN BRI at the physical, data link, and network levels, as well as PPP, MMP, and telephone interfaces Design, configure, and troubleshoot Frame Relay UNI and NNI interfaces, with a focus on new installs, wrong DLCI, LMI settings, performance and multicast issues, and re-hosting of Frame Relay service Design, configure, and troubleshoot PTPP, L2TP, and IPSec VPNs, examining specific VPN clients, Internet technology, and LAN issues Resolve common availability issues for all major remote access technologies through real-world scenarios for dial, ISDN, Frame Relay, and VPNs The ranks of telecommuters, remote employees, and mobile users are growing every day and their communications needs are expanding just as rapidly. …”
    Libro electrónico
  4. 4
    Publicado 2003
    “…Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. …”
    Libro electrónico
  5. 5
    Publicado 2006
    “…A practical guide for comparing, designing, and deploying IPsec, MPLS Layer 3, L2TPv3, L2TPv2, AToM, and SSL virtual private networks Explore the major VPN technologies and their applications, design, and configurations on the Cisco IOS® Router, Cisco® ASA 5500 Series, and the Cisco VPN 3000 Series Concentrator platforms Compare the various VPN protocols and technologies, learn their advantages and disadvantages, and understand their real-world applications and methods of integration Find out how to design and implement Secure Socket Layer (SSL) VPNs, including consideration of clientless operation, the Cisco SSL VPN Client, the Cisco Secure Desktop, file and web server access, e-mail proxies, and port forwarding Learn how to deploy scalable and secure IPsec and L2TP remote access VPN designs, including consideration of authentication, encryption, split-tunneling, high availability, load-balancing, and NAT transparency Master scalable IPsec site-to-site VPN design and implementation including configuration of security protocols and policies, multiprotocol/ multicast traffic transport, NAT/PAT traversal, quality of service (QoS), Dynamic Multipoint VPNs (DMVPNs), and public key infrastructure (PKI) Virtual private networks (VPNs) enable organizations to connect offices or other sites over the Internet or a service provider network and allow mobile or home-based users to enjoy the same level of productivity as those who are in the same physical location as the central network. …”
    Libro electrónico
  6. 6
    Publicado 2006
    “…Delivered in Adobe PDF format for quick and easy access, Encryption in a Windows Environment: EFS File, 802.1x Wireless, IPSec Transport, and S/MIME Exchange, 1/e covers the installation and operation of EFS file encryption, IPSec communications encryption, 802.1x wireless encryption, L2TP mobile encryption, as well as the auto-enrollment of certificates that drastically simplifies the administration of encrypted communications. …”
    Libro electrónico
  7. 7
    por Bhaiji, Fahim Hussain Yusuf
    Publicado 2004
    “…Seven comprehensive CCIE security labs to hone configuration and troubleshooting skills Prepare for the CCIE Security lab exam and hone your security configuration and troubleshooting skills with seven complete practice scenarios that cover: Basic device configuration Routing configuration ISDN configuration Cisco PIX Firewall configuration VPN configuration, including IPSec, GRE, L2TP, and PPTP VPN-3000 Concentrator configuration Intrusion Detection System (IDS) 42xx Appliance configuration Cisco IOS Firewall configuration AAA configuration Advanced security issues IP services and protocol-independent features Security violations The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. …”
    Libro electrónico
  8. 8
    Publicado 1999
    “…It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). …”
    Libro electrónico
  9. 9
    Publicado 2003
    “…Coverage includes: New, in-depth deployment guidance: policy definition, representation, distribution, and management New IPSec enhancements: compression, multicast, key recovery, L2TP support, PKI integration, and more IPSec architecture and components: payloads, headers, Internet Key Exchange, security associations, and more Implementation architecture and techniques, including overlapping and shared security associations, nested and chained tunnels, and more IPSec security in host-to-host, host-to-gateway, and gateway-to-gateway scenarios Establishing secure VPN tunneling A detailed look inside the IPSec kernel IPSec, Second Edition delivers the techniques and insight you need to protect all your digital assets, wherever they are—on the Internet, your intranet, your extranet, or your VPN. …”
    Libro electrónico
  10. 10
    por Fabbri, Rosato
    Publicado 2013
    Tabla de Contenidos: “…Configuring a policy for the SSL VPN portal -- FortiGate IPsec VPN -- Configuring an IPsec VPN -- Designing a Gateway-to-Gateway VPN -- Hub-and-Spoke VPN -- Dialup VPN -- FortiClient dialup client -- L2TP VPN -- Summary -- 4. High Availability -- Link aggregation -- Virtual MAC addresses -- FortiGate Cluster Protocol -- Active-Passive and Active-Active Clusters -- FortiGate Session Life Support Protocol -- Virtual Router Redundancy Protocol -- Full mesh high availability -- Introducing virtual domains -- VDOMs and virtual clustering -- Summary -- 5. …”
    Libro electrónico
  11. 11
    por Andrés Alonso, Javier
    Publicado 2009
    “…Y por último, se ha dedicado un capítulo por cada clase de VPN tratada: IPSec, PPTP, L2TP/IPSec y SSL. El planteamiento de exposición para los capítulos correspondientes a las VPNs será común para todos los protocolos. …”
    Libro
  12. 12
    Publicado 2005
    “…The book also examines the different tunneling protocols used for VPN solutions today, namely GRE, IPSec, and L2TP, with examples of how these solutions are deployed and a discussion of their strengths and weaknesses. …”
    Libro electrónico
  13. 13
    Publicado 2018
    Tabla de Contenidos: “…Configuring traffic shaping -- The Multiple Lan/Wan configuration wizard -- The Dedicated Links wizard -- Advanced traffic shaping configuration -- Changes to queues -- Limiters -- Manual rule configuration -- Example #1 - modifying the penalty box -- Example #2 - prioritizing EchoLink -- Using Snort for traffic shaping -- Installing and configuring Snort -- Troubleshooting -- Summary -- Questions -- Further reading -- Chapter 8: Virtual Private Networks -- Technical requirements -- VPN fundamentals -- IPsec -- L2TP -- OpenVPN -- Choosing a VPN protocol -- VPN hardware -- Configuring a VPN tunnel -- IPsec configuration -- IPsec peer/server congfiguration -- IPsec mobile client configuration -- Pre-shared keys -- Advanced settings -- Example 1 - Site-to-site IPsec configuration -- Example 2 - IPsec tunnel for mobile remote access -- L2TP -- OpenVPN -- OpenVPN server configuration -- OpenVPN client configuration -- Server configuration with the wizard -- OpenVPN Client Export Utility -- Troubleshooting VPNs -- Summary -- Questions -- Further reading -- Chapter 9: Multiple WANs -- Technical requirements -- Multi-WAN fundamentals -- Service-level agreement -- Policy-based routing -- Failover and load balancing -- When is a gateway down? …”
    Libro electrónico
  14. 14
    Publicado 2017
    Tabla de Contenidos: “…802.11 Security History802.11i Security Amendment and WPA Certifications; Robust Security Network (RSN); Summary; Exam Essentials; Review Questions; Chapter 2 Legacy 802.11 Security; Authentication; Open System Authentication; Shared Key Authentication; Wired Equivalent Privacy (WEP) Encryption; TKIP; Virtual Private Networks (VPNs); Point-to-Point Tunneling Protocol (PPTP); Layer 2 Tunneling Protocol (L2TP); Internet Protocol Security (IPsec); Secure Sockets Layer (SSL); VPN Configuration Complexity; VPN Scalability; MAC Filters; SSID Segmentation; SSID Cloaking; Summary; Exam Essentials…”
    Libro electrónico
  15. 15
    Publicado 2018
    Tabla de Contenidos: “…Installing and configuring Snort -- Troubleshooting traffic shaping -- Summary -- Questions -- Further reading -- Chapter 7: Virtual Private Networks -- Technical requirements -- VPN fundamentals -- IPsec -- L2TP -- OpenVPN -- AES-NI -- Choosing a VPN protocol -- Configuring a VPN tunnel -- IPsec -- IPsec peer/server configuration -- IPsec mobile client configuration -- Example 1 - Site-to-site IPsec configuration -- Example 2 - IPsec tunnel for remote access -- L2TP -- OpenVPN -- OpenVPN server configuration -- OpenVPN client configuration -- Client-specific overrides -- Server configuration with the wizard -- OpenVPN Client Export Utility -- Example - site-to-site OpenVPN configuration -- Troubleshooting -- Summary -- Questions -- Chapter 8: Redundancy and High Availability -- Technical requirements -- Basic concepts -- Server load balancing -- Example - load balancer for a web server -- HAProxy - a brief overview -- CARP configuration -- Example 1 - CARP with two firewalls -- Example 2 - CARP with N firewalls -- An example of both load balancing and CARP -- Troubleshooting -- Summary -- Questions -- Further reading -- Chapter 9: Multiple WANs -- Technical requirements -- Basic concepts -- Service Level Agreement -- Multi-WAN configuration -- DNS considerations -- NAT considerations -- Third-party packages -- Example - multi-WAN and CARP -- Troubleshooting -- Summary -- Questions -- Chapter 10: Routing and Bridging -- Technical requirements -- Basic concepts -- Bridging -- Routing -- Routing -- Static routes -- Public IP addresses behind a firewall -- Dynamic routing -- RIP -- OpenBGPD -- Quagga OSPF -- FRRouting -- Policy-based routing -- Bridging -- Bridging interfaces -- Special issues -- Bridging example -- Troubleshooting -- Summary -- Questions -- Chapter 11: Extending pfSense with Packages -- Technical requirements -- Basic considerations…”
    Libro electrónico
  16. 16
    Publicado 2011
    Tabla de Contenidos: “…Security Topologies -- Security Zones -- Telephony -- VLANs -- NAT -- Tunneling -- Chapter Review -- Questions -- Answers -- Chapter 9 Authentication and Remote Access -- The Remote Access Process -- Identification -- Authentication -- Authorization -- IEEE 802. 1X -- RADIUS -- RADIUS Authentication -- RADIUS Authorization -- RADIUS Accounting -- DIAMETER -- TACACS+ -- TACACS+ Authentication -- TACACS+ Authorization -- TACACS+ Accounting -- L2TP and PPTP -- PPTP -- PPP -- CHAP -- PAP -- EAP -- L2TP -- NT LAN Manager -- Telnet -- FTP/FTPS/SFTP -- SSH -- IEEE 802.11 -- VPNs -- IPsec -- Security Associations -- IPsec Configurations -- IPsec Security -- Vulnerabilities -- Chapter Review -- Questions -- Answers -- Chapter 10 Wireless Security -- Wireless Networking -- Mobile Phones -- Bluetooth -- 802. 11 -- Chapter Review -- Questions -- Answers -- Part IV Security in Transmissions -- Chapter 11 Intrusion Detection Systems -- History of Intrusion Detection Systems -- IDS Overview -- Host-based IDSs -- Advantages of HIDSs -- Disadvantages of HIDSs -- Active vs. …”
    Libro electrónico
  17. 17
    por Gómez Vieites, Álvaro
    Publicado 2014
    Tabla de Contenidos: “…COMUNICACIONES SEGURAS; 3.1 EL PAPEL DE LAS REDES PRIVADAS VIRTUALES; 3.2 PROTOCOLOS PARA REDES PRIVADAS VIRTUALES; 3.2.1 PPTP, L2F y L2TP; 3.2.2 IP Security Protocol (IPSec); 3.2.3 Redes privadas (...) ; 3.2.4 Otras consideraciones; 3.3 DIRECCIONES DE INTERÉS; CAPÍTULO 4. …”
    Libro electrónico
  18. 18
    por Frahim, Jazib, Santos, Omar
    Publicado 2010
    Tabla de Contenidos: “…Chapter 14 Configuring Cisco Content Security and Control Security Services Module -- Initial CSC SSM Setup -- Configuring CSC SSM Web-Based Features -- Configuring CSC SSM Mail-Based Features -- Configuring CSC SSM File Transfer Protocol (FTP) -- Summary -- Chapter 15 Monitoring and Troubleshooting the Cisco Content Security and Control Security Services Module -- Monitoring the CSC SSM -- Troubleshooting the CSC SSM -- Summary -- Part V: Virtual Private Network (VPN) Solutions -- Chapter 16 Site-to-Site IPSec VPNs -- Preconfiguration Checklist -- Configuration Steps -- Advanced Features -- Modifying Default Parameters -- Deployment Scenarios -- Monitoring and Troubleshooting Site-to-Site IPSec VPNs -- Summary -- Chapter 17 IPSec Remote-Access VPNs -- Cisco IPSec Remote Access VPN Solution -- Advanced Cisco IPSec VPN Features -- L2TP Over IPSec Remote Access VPN Solution -- Deployment Scenarios -- Monitoring and Troubleshooting Cisco Remote-Access VPN -- Summary -- Chapter 18 Public Key Infrastructure (PKI) -- Introduction to PKI -- Installing Certificates -- The Local Certificate Authority -- Configuring IPSec Site-to-Site Tunnels Using Certificates -- Configuring the Cisco ASA to Accept Remote-Access IPSec VPN Clients Using Certificates -- Troubleshooting PKI -- Summary -- Chapter 19 Clientless Remote-Access SSL VPNs -- SSL VPN Design Considerations -- SSL VPN Prerequisites -- Pre-SSL VPN Configuration Guide -- Clientless SSL VPN Configuration Guide -- Cisco Secure Desktop -- Host Scan -- Dynamic Access Policies -- Deployment Scenarios -- Monitoring and Troubleshooting SSL VPN -- Summary -- Chapter 20 Client-Based Remote-Access SSL VPNs -- SSL VPN Deployment Considerations -- SSL VPN Prerequisites -- Pre-SSL VPN Configuration Guide -- AnyConnect VPN Client Configuration Guide -- Deployment Scenario of AnyConnect Client…”
    Libro electrónico
  19. 19
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Always On VPN Overview -- VPN -- DirectAccess -- Demise of DirectAccess -- DirectAccess Replacement -- Always On VPN -- Always On VPN Infrastructure -- Routing and Remote Access Service -- Network Policy Server -- Infrastructure Independent -- Modern Management -- Cloud Integration -- Summary -- Chapter 2: Plan for Always On VPN -- VPN Server -- Windows Server -- Domain Join -- Server Core -- Network Interfaces -- Network Placement -- IPv6 -- Non-Microsoft VPN Devices -- IKEv2 -- Windows Store Client -- Authentication Server -- Windows Server -- PKI -- VPN Protocols -- IKEv2 -- SSTP -- L2TP -- PPTP -- Certificates -- SSTP -- IKEv2 -- NPS -- User Authentication -- Device Authentication -- TPM -- VPN Client IP Addressing -- DHCP -- Static Pool -- Address Range -- IPv4 Subnet -- IPv6 Prefix -- Split vs. …”
    Libro electrónico
  20. 20
    Publicado 2013
    Tabla de Contenidos: “…Application Control -- Must-Have Firewall Features -- Core Firewall Functions -- Network Address Translation (NAT) -- Auditing and Logging -- Additional Firewall Capabilities -- Application and Website Malware Execution Blocking -- Antivirus -- Intrusion Detection and Intrusion Prevention -- Web Content (URL) Filtering and Caching -- E-Mail (Spam) Filtering -- Enhance Network Performance -- Firewall Design -- Firewall Strengths and Weaknesses -- Firewall Placement -- Firewall Configuration -- Summary -- References -- Chapter 16: Virtual Private Networks -- How a VPN Works -- VPN Protocols -- IPSec -- PPTP -- L2TP over IPSec -- SSL VPNs -- Remote Access VPN Security -- Authentication Process -- Client Configuration -- Client Networking Environment -- Offline Client Activity -- Site-to-Site VPN Security -- Summary -- References -- Chapter 17: Wireless Network Security -- Radio Frequency Security Basics -- Security Benefits of RF Knowledge -- Layer One Security Solutions -- Data-Link Layer Wireless Security Features, Flaws, and Threats -- 802.11 and 802.15 Data-Link Layer in a Nutshell -- 802.11 and 802.15 Data-Link Layer Vulnerabilities and Threats -- Closed-System SSIDs, MAC Filtering, and Protocol Filtering -- Built-in Bluetooth Network Data-Link Security and Threats -- Wireless Vulnerabilities and Mitigations -- Wired Side Leakage -- Rogue Access Points -- Misconfigured Access Points -- Wireless Phishing -- Client Isolation -- Wireless Network Hardening Practices and Recommendations -- Wireless Security Standards -- Temporal Key Integrity Protocol and Counter Mode with CBC-MAC Protocol -- 802.1x-Based Authentication and EAP Methods -- Wireless Intrusion Detection and Prevention -- Wireless IPS and IDS -- Bluetooth IPS -- Wireless Network Positioning and Secure Gateways -- Summary -- References…”
    Libro electrónico