By International Business Machines Corporation

ISBN-10: 0738414956

ISBN-13: 9780738414959

Show description

Read Online or Download A comprehensive guide to virtual private networks. Volume II PDF

Similar nonfiction_7 books

Read e-book online Welding Robots: Technology, System Issues and Applications PDF

From vehicle production to the creation of area of interest items, welding is now the most frequent and profitable functions of commercial robotics. Welding Robotics: know-how, procedure concerns and alertness is a close assessment of robot welding firstly of the twenty-first century.

Waves in Nonlinear Pre-Stressed Materials - download pdf or read online

The papers during this ebook supply a special state of the art multidisciplinary review near to waves in pre-stressed fabrics in the course of the interplay of a number of themes, starting from the mathematical modelling of incremental fabric reaction (elastic and inelastic), to the research of the governing differential equations and boundary-value difficulties, and to computational tools for the answer to those difficulties, with specific connection with commercial, geophysical, and biomechanical functions.

Additional info for A comprehensive guide to virtual private networks. Volume II

Sample text

VPNs securely convey information across the Internet connecting remote users, branch offices, and business partners into an extended corporate network, as shown in Figure 1 on page 4. It will help you to understand the concepts discussed in this redbook to summarize and return to the basic concepts that distinguish VPNs from other components of a networking infrastructure as well as from mere application security solutions: It is virtual: This means that the physical infrastructure of the network has to be transparent to any VPN connections.

Both work-at-home and on-the-road employees want convenient and secure dial-in access to their company's networks; and sometimes they even need to communicate with hosts located inside another company's network. We refer to both work-at-home and on-the-road users as remote users . This segment extends from a remote user's machine to an access box provided by the ISP. The protocols and procedures used on this link are specified by the Internet Service Provider. Today, most ISPs support the Point-to-Point Protocol (PPP) suite of protocols on this segment.

That will provide you with a fair understanding of which events are significant to log permanently and which events should only be logged in case there are specific problems. VPN gateways of several leading vendors also have the capability to log to a dedicated log server in order to avoid local resource overruns. That way you can collect and evaluate logging information in a central location which makes intrusion detection and trend determination much easier. 4 Conclusions Some performance issues, such as encryption, are easier to tackle than others, such as quality of service.

Download PDF sample

A comprehensive guide to virtual private networks. Volume II by International Business Machines Corporation

by Charles

Rated 4.98 of 5 – based on 44 votes