Overview
Substantial interest in VPN has been created by concerns for privacy and data protection. You, the administrator must be aware of security concepts and network designs, and yet, customers require flexible network environments that will satisfy the needs of today's computer users. You must support laptop users, home LAN environments, complex branch offices, and more--all within a secure and effective network design. The way you implement VPNs in Windows 2000 is different than any other operating system. Windows 2000 Virtual Private Networking will cover all aspects of both the tunnel client. Microsoft is using PPTP, L2TP and IPSec all in this one product and the configuration of both tunnel and transport configuration can be very complex. This book covers what you, the network designer can do with this capability; new VPN features that can affect Active Directory replication; network address translation; Proxy and more will be covered in depth.
Table of contents
Preface.
Introduction.
1. What Is a Virtual Private Network?
2. Basic Virtual Private Network Deployment.
3. VPN Features in Windows 2000.
4. Point-to-Point Tunneling Protocol (PPTP).
5. Certificates.
6. Internet Protocol Security (IPSec).
7. Layer 2 Tunneling Protocol (L2TP).
8. NAT and Proxy Servers.
9. Connection Manager, Remote Access Policy, and IAS.
10. Routing and Filtering.
11. Name Resolution in Windows 2000.
12. Active Directory Design in VPNs.
Appendix A. History and Context of Virtual Private Networking.
Appendix B. Troubleshooting.
Appendix C. Windows 2000 to Cisco IOS IPSec Connectivity.
Appendix D. VPN and Network Futures.
Index.
For teachers
All the material you need to teach your courses.
Discover teaching materialPublished by Sams Publishing (January 19th 2001) - Copyright © 2001