Complete Cisco VPN Configuration Guide, The

  • Published: Dec 15, 2005
  • Copyright 2006
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 1032
  • Edition: 1st
  • Book
  • ISBN-10: 1-58705-204-0
  • ISBN-13: 978-1-58705-204-0
  • eBook (Watermarked)
  • ISBN-10: 1-58705-445-0
  • ISBN-13: 978-1-58705-445-7

Register your product to gain access to bonus material or receive a coupon.

More Information

DescriptionReviewsSample Content

Product Description

Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution

 

  • A complete resource for understanding VPN components and VPN design issues
  • Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients
  • Discover troubleshooting tips and techniques from real-world scenarios based on the author’s vast field experience
  • Filled with relevant configurations you can use immediately in your own network

 

With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. As Cisco Systems® integrates security and access features into routers, firewalls, clients, and concentrators, its solutions become ever more accessible to companies with networks of all sizes. The Complete Cisco VPN Configuration Guide contains detailed explanations of all Cisco® VPN products, describing how to set up IPsec and Secure Sockets Layer (SSL) connections on any type of Cisco device, including concentrators, clients, routers, or Cisco PIX® and Cisco ASA security appliances. With copious configuration examples and troubleshooting scenarios, it offers clear information on VPN implementation designs.

 

Part I, “VPNs,” introduces the topic of VPNs and discusses today’s main technologies, including IPsec. It also spends an entire chapter on SSL VPNs, the newest VPN technology and one that Cisco has placed particular emphasis on since 2003. Part II, “Concentrators,” provides detail on today’s concentrator products and covers site-to-site and remote-access connection types with attention on IPsec and WebVPN. Part III covers the Cisco VPN Client versions 3.x and 4.x along with the Cisco3002 Hardware Client. Cisco IOS® routers are the topic of Part IV, covering scalable VPNs with Dynamic Multipoint VPN, router certificate authorities, and router remote access solutions. Part V explains Cisco PIX and Cisco ASA security appliances and their roles in VPN connectivity, including remote access and site-to-site connections. In Part VI, a case study shows how a VPN solution is best implemented in the real world using a variety of Cisco VPN products in a sample network.

 

This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

 

Customer Reviews

12 of 13 people found the following review helpful
3.0 out of 5 stars Great if you like GUI applications, not if you use the CLI., November 3, 2006
By 
Amazon Verified Purchase(What's this?)
This review is from: The Complete Cisco VPN Configuration Guide (Paperback)
I was hoping that the book would spend more time on actual router configuration rather than use GUI-related products. It was difficult to divine the actual config while wading through page after page of screen-shots.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


7 of 9 people found the following review helpful
1.0 out of 5 stars Scratch "Complete" from the Title, August 19, 2008
By 
George W. Mays (San Antonio, TX USA) - See all my reviews
(REAL NAME)   
Amazon Verified Purchase(What's this?)
This review is from: The Complete Cisco VPN Configuration Guide (Paperback)
Very disappointed. I have a 950 page book that does not cover setting up an IOS router for remote access using PPTP or L2TP. WTF? Heck - that's why I bought this expensive book. If you have deep pockets and can buy whatever cisco gear you like then this book will likely introduce you to many possible VPN solutions. But there seems to be a bias in the book toward large enterprise solutions - with little or no consideration given to SOHO and small businesses. Many of us make do with the resources that we have available and can't just go out a buy stuff because the author thinks a remote access concentrator would be "best." I still can't believe that he doesn't cover configuring IOS for access by Windows PPTP or L2TP clients. I'm stunned. With this glaring omission I can't help but wonder about the completeness of the other content. Thumbs down.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


4 of 6 people found the following review helpful
4.0 out of 5 stars A useful read for security professionals, January 29, 2006
By 
Wole Akpose "wolexca" (dundalk, md United States) - See all my reviews
(REAL NAME)   
This review is from: The Complete Cisco VPN Configuration Guide (Paperback)
A thorough and complete review of VPN technologies, as implemented in Cisco infrastructure, Deal's `The Complete Cisco VPN Configuration Guide', is arranged as a twenty three chapter step by step technology review and one chapter of bonus case studies.

The forty page Case study at the end of the book demonstrates the books material in a concise, simple and easy to follow way and its compactness will make it useful for an engineer who has general ideas about VPN , yet need to get a site running quickly. This chapter can be read without a full understanding of the remainder of the text, productively.

The rest of the text is arranged into five parts, viz., VPNs, Concentrators, Clients, IOS routers and PIX firewall. The first part being a good attempt at VPN technology review. The presentation of the technologies in the part, of five chapters is generic enough to appeal to a wide audience of security professionals. The arrangement of the subject into chapter one... Read more
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


Share your thoughts with other customers:
 See all 8 customer reviews...

Praise For Complete Cisco VPN Configuration Guide, The

The Complete Cisco VPN Configuration Guide
Reviewer Name: Brad Bledsoe, Sr. Technical Manager
Reviewer Certifications: CCIP, CCNP, CCDP

This book is an excellent reference on VPNs. It should be in every networking professional’s personal library who designs, deploys, and manages a VPN solution. The diagrams are clear and easy to follow. The troubleshooting chapters of each section provide excellent tools as well as common mistakes to help the networking professional deploy their solution successfully. The case study provides an invaluable example of a real world deployment. While the book is not advertised to be an exam preparation or certification guide, it could easily be used as a supplement towards those studies.

Review by Wole Akpose, CCNA
Review by Martin Kurniawan, CCNA

Index

Download - 125 KB -- Index

Table of Contents

Part I VPNs

Chapter 1 Overview of VPNs

Chapter 2 VPN Technologies

Chapter 3 IPsec

Chapter 4 PPTP and L2TP

Chapter 5 SSL VPNs

Part II Concentrators

Chapter 6 Concentrator Product Information

Chapter 7 Concentrator Remote Access Connections with IPsec

Chapter 8 Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN

Chapter 9 Concentrator Site-to-Site Connections

Chapter 10 Concentrator Management

Chapter 11 Verifying and Troubleshooting Concentrator Connections

Part III Clients

Chapter 12 Cisco VPN Software Client

Chapter 13 Windows Software Client

Chapter 14 3002 Hardware Client

Part IV IOS Routers

Chapter 15 Router Product Information

Chapter 16 Router ISAKMP/IKE Phase 1 Connectivity

Chapter 17 Router Site-to-Site Connections

Chapter 18 Router Remote Access Connections

Chapter 19 Troubleshooting Router Connections

Part V PIX Firewalls

Chapter 20 PIX and ASA Product Information

Chapter 21 PIX and ASA Site-to-Site Connections

Chapter 22 PIX and ASA Remote Access Connections

Chapter 23 Troubleshooting PIX and ASA Connections

Part VI Case Study

Chapter 24 Case Study

 

Downloadable Sample Chapter

Download - 2.4 MB -- Chapter 8: Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN

Best Value

Book + eBook Bundle $158.00 $95.80

Book Price: $72.00
eBook Price: $23.80

Buy

This book includes free shipping!

Buy

Book  $90.00  $72.00

Usually ships in 24 hours.

This book includes free shipping!

Buy

eBook (Watermarked)  $68.00  $54.40

About Watermarked eBooks

This PDF will be accessible from your Account page after purchase and requires the free Adobe® Reader® software to read it.

The eBook requires no passwords or activation to read. We customize your eBook by discretely watermarking it with your name, making it uniquely yours.

Watermarked eBook FAQ

Purchase Reward: One Month Free Subscription
By completing any purchase on Cisco Press, you become eligible for an unlimited access one-month subscription to Safari Books Online.

Get access to thousands of books and training videos about technology, professional development and digital media from more than 40 leading publishers, including Addison-Wesley, Prentice Hall, Cisco Press, IBM Press, O'Reilly Media, Wrox, Apress, and many more. If you continue your subscription after your 30-day trial, you can receive 30% off a monthly subscription to the Safari Library for up to 12 months. That's a total savings of $199.