VPNs Illustrated: Tunnels, VPNs, and IPsec

ยท Addison-Wesley Professional
3.8
แž€แžถแžšแžœแžถแž™แžแž˜แŸ’แž›แŸƒ 16
แžŸแŸ€แžœแž—แŸ…โ€‹แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž…
480
แž‘แŸ†แž–แŸแžš
แž˜แžถแž“แžŸแžทแž‘แŸ’แž’แžท
แž€แžถแžšแžœแžถแž™แžแž˜แŸ’แž›แŸƒ แž“แžทแž„แž˜แžแžทแžœแžถแž™แžแž˜แŸ’แž›แŸƒแž˜แžทแž“แžแŸ’แžšแžผแžœแž”แžถแž“แž•แŸ’แž‘แŸ€แž„แž•แŸ’แž‘แžถแžแŸ‹แž‘แŸ แžŸแŸ’แžœแŸ‚แž„แž™แž›แŸ‹แž”แž“แŸ’แžแŸ‚แž˜

แžขแŸ†แž–แžธแžŸแŸ€แžœแž—แŸ…โ€‹แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž€แž“แŸแŸ‡

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment.

Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." By learning to read and interpret various network traces, such as those produced by tcpdump, readers will be able to better understand and troubleshoot VPN and network behavior.

Specific topics covered include:

  • Block and stream symmetric ciphers, such as AES and RC4; and asymmetric ciphers, such as RSA and EIGamal
  • Message authentication codes, including HMACs
  • Tunneling technologies based on gtunnel
  • SSL protocol for building network-to-network VPNs
  • SSH protocols as drop-in replacements for telnet, ftp, and the BSD r-commands
  • Lightweight VPNs, including VTun, CIPE, tinc, and OpenVPN
  • IPsec, including its Authentication Header (AH) protocol, Encapsulating Security Payload (ESP), and IKE (the key management protocol)

Packed with details, the text can be used as a handbook describing the functions of the protocols and the message formats that they use. Source code is available for download, and an appendix covers publicly available software that can be used to build tunnels and analyze traffic flow.

VPNs Illustrated gives you the knowledge of tunneling and VPN technology you need to understand existing VPN implementations and successfully create your own.



แž€แžถแžšแžŠแžถแž€แŸ‹แž•แŸ’แž€แžถแž™ แž“แžทแž„แž˜แžแžทแžœแžถแž™แžแž˜แŸ’แž›แŸƒ

3.8
แž€แžถแžšแžœแžถแž™แžแž˜แŸ’แž›แŸƒ 16

แžขแŸ†แž–แžธโ€‹แžขแŸ’แž“แž€แž“แžทแž–แž“แŸ’แž’

Jon C. Snader is a TCP/IP and VPN expert whose background includes work in communications, networking, compiler development, operating systems, and radio network controllers.



แžœแžถแž™แžแž˜แŸ’แž›แŸƒแžŸแŸ€แžœแž—แŸ…โ€‹แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž€แž“แŸแŸ‡

แž”แŸ’แžšแžถแž”แŸ‹แž™แžพแž„แžขแŸ†แž–แžธแž€แžถแžšแž™แž›แŸ‹แžƒแžพแž‰แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แŸ”

แžขแžถแž“โ€‹แž–แŸแžแŸŒแž˜แžถแž“

แž‘แžผแžšแžŸแž–แŸ’แž‘แž†แŸ’แž›แžถแžแžœแŸƒ แž“แžทแž„โ€‹แžแŸแž”แŸ’แž›แŸแž
แžŠแŸ†แžกแžพแž„แž€แž˜แŸ’แž˜แžœแžทแž’แžธ Google Play Books แžŸแž˜แŸ’แžšแžถแž”แŸ‹ Android แž“แžทแž„ iPad/iPhone แŸ” แžœแžถโ€‹แž’แŸ’แžœแžพแžŸแž˜แž€แžถแž›แž€แž˜แŸ’แž˜โ€‹แžŠแŸ„แž™แžŸแŸ’แžœแŸแž™แž”แŸ’แžšแžœแžแŸ’แžแžทแž‡แžถแž˜แžฝแž™โ€‹แž‚แžŽแž“แžธโ€‹แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€โ€‹ แž“แžทแž„โ€‹แžขแž“แžปแž‰แŸ’แž‰แžถแžแžฑแŸ’แž™โ€‹แžขแŸ’แž“แž€แžขแžถแž“แž–แŸแž›โ€‹แž˜แžถแž“แžขแŸŠแžธแž“แž’แžบแžŽแžทแž แžฌแž‚แŸ’แž˜แžถแž“โ€‹แžขแŸŠแžธแž“แž’แžบแžŽแžทแžโ€‹แž“แŸ…แž‚แŸ’แžšแž”แŸ‹แž‘แžธแž€แž“แŸ’แž›แŸ‚แž„แŸ”
แž€แžปแŸ†แž–แŸ’แž™แžผแž‘แŸแžšโ€‹แž™แžฝแžšแžŠแŸƒ แž“แžทแž„แž€แžปแŸ†แž–แŸ’แž™แžผแž‘แŸแžš
แžขแŸ’แž“แž€แžขแžถแž…แžŸแŸ’แžŠแžถแž”แŸ‹แžŸแŸ€แžœแž—แŸ…แž‡แžถแžŸแŸ†แžกแŸแž„แžŠแŸ‚แž›แž”แžถแž“แž‘แžทแž‰แž“แŸ…แž€แŸ’แž“แžปแž„ Google Play แžŠแŸ„แž™แž”แŸ’แžšแžพแž€แž˜แŸ’แž˜แžœแžทแž’แžธแžšแžปแž€แžšแž€แžแžถแž˜แžขแŸŠแžธแž“แž’แžบแžŽแžทแžแž€แŸ’แž“แžปแž„แž€แžปแŸ†แž–แŸ’แž™แžผแž‘แŸแžšแžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แŸ”
eReaders แž“แžทแž„โ€‹แžงแž”แž€แžšแžŽแŸโ€‹แž•แŸ’แžŸแŸแž„โ€‹แž‘แŸ€แž
แžŠแžพแž˜แŸ’แž”แžธแžขแžถแž“แž“แŸ…แž›แžพโ€‹แžงแž”แž€แžšแžŽแŸ e-ink แžŠแžผแž…แž‡แžถโ€‹แžงแž”แž€แžšแžŽแŸแžขแžถแž“โ€‹แžŸแŸ€แžœแž—แŸ…แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž€ Kobo แžขแŸ’แž“แž€แž“แžนแž„แžแŸ’แžšแžผแžœโ€‹แž‘แžถแž‰แž™แž€โ€‹แžฏแž€แžŸแžถแžš แž แžพแž™โ€‹แž•แŸ’แž‘แŸแžšแžœแžถแž‘แŸ…โ€‹แžงแž”แž€แžšแžŽแŸโ€‹แžšแž”แžŸแŸ‹แžขแŸ’แž“แž€แŸ” แžŸแžผแž˜แžขแž“แžปแžœแžแŸ’แžแžแžถแž˜โ€‹แž€แžถแžšแžŽแŸ‚แž“แžถแŸ†แž›แž˜แŸ’แžขแžทแžแžšแž”แžŸแŸ‹แž˜แž‡แŸ’แžˆแž˜แžŽแŸ’แžŒแž›แž‡แŸ†แž“แžฝแž™ แžŠแžพแž˜แŸ’แž”แžธแž•แŸ’แž‘แŸแžšแžฏแž€แžŸแžถแžšโ€‹แž‘แŸ…แžงแž”แž€แžšแžŽแŸแžขแžถแž“แžŸแŸ€แžœแž—แŸ…โ€‹แžขแŸแžกแžทแž…แžแŸ’แžšแžผแž“แžทแž€แžŠแŸ‚แž›แžŸแŸ’แž‚แžถแž›แŸ‹แŸ”