IPsec Virtual Private Network Fundamentals (Paperback)
暫譯: IPsec 虛擬私人網路基礎知識 (平裝本)
James Henry Carmouche
- 出版商: Cisco Press
- 出版日期: 2006-07-01
- 售價: $2,540
- 貴賓價: 9.5 折 $2,413
- 語言: 英文
- 頁數: 480
- 裝訂: Paperback
- ISBN: 1587052075
- ISBN-13: 9781587052071
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$823Simulation Modeling and Analysis, 3/e
-
$2,370$2,252 -
$1,102Unix Network Programming, Vol. 1 : The Sockets Networking API, 3/e (IE-Paperback)
-
$750$593 -
$780$616 -
$2,610$2,480 -
$880$695 -
$2,080Understanding the Linux Kernel, 3/e (Paperback)
-
$790$521 -
$650$553 -
$780$663 -
$650$507 -
$980$774 -
$880$695 -
$880$695 -
$680$537 -
$720$569 -
$550$468 -
$580$493 -
$1,200$948 -
$490$382 -
$399CWNA: Certified Wireless Network Administrator Official Study Guide: (Exam PW0-104), 2/e (Paperback)
-
$3,020$2,869 -
$1,881Implementing SSL / TLS Using Cryptography and PKI (Paperback)
-
$1,511Shell Scripting: Expert Recipes for Linux, Bash and more (Paperback)
相關主題
商品描述
Description
An introduction to designing and configuring Cisco IPsec VPNs
Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutions
IPsec Virtual Private Network Fundamentals provides a basic working knowledge of IPsec on various Cisco routing and switching platforms. It provides the foundation necessary to understand the different components of Cisco IPsec implementation and how it can be successfully implemented in a variety of network topologies and markets (service provider, enterprise, financial, government). This book views IPsec as an emerging requirement in most major vertical markets, explaining the need for increased information authentication, confidentiality, and non-repudiation for secure transmission of confidential data. The book is written using a layered approach, starting with basic explanations of why IPsec was developed and the types of organizations relying on IPsec to secure data transmissions. It then outlines the basic IPsec/ISAKMP fundamentals that were developed to meet demand for secure data transmission. The book covers the design and implementation of IPsec VPN architectures using an array of Cisco products, starting with basic concepts and proceeding to more advanced topics including high availability solutions and public key infrastructure (PKI). Sample topology diagrams and configuration examples are provided in each chapter to reinforce the fundamentals expressed in text and to assist readers in translating concepts into practical deployment scenarios. Additionally, comprehensive case studies are incorporated throughout to map topics to real-world solutions.
Table of Contents
Contents
Introduction
Part I Introductory Concepts and Configuration/Troubleshooting
Chapter 1 Introduction to VPN Technologies
VPN Overview of Common Terms
Characteristics of an Effective VPN
VPN Technologies
Virtual Private Dialup Networks
Multiprotocol Label Switching VPNs
IPsec VPNs
Transport Layer VPNs
Common VPN Deployments
Site-to-Site VPNs
Remote Access VPNs
Business Drivers for VPNs
Remote Access VPN Business Drivers–A Practical Example
Site-to-Site VPN Business Drivers–A Practical Example
IPsec VPNs and the Cisco Security Framework
Summary
Chapter 2 IPsec Fundamentals
Overview of Cryptographic Components
Asymmetric Encryption
Symmetric Encryption
Message Authentication, Message Integrity, and Sender Nonrepudiation Mechanisms
Public Key Encryption Methods
RSA Public-Key Technologies
Diffie-Hellman Key Exchange
The IP Security Protocol (IPsec)
IPsec Modes
IPsec Transforms
IPsec SA
IPsec Configuration Elements
Manual Keying
The Need for Security Association and Key Management
IKE and ISAKMP
IKE and ISAKMP Terminology and Background
IKE SA Negotiation and Maintenance
IPsec Diffie-Hellman Shared Secret Key Generation Using IKE
IKE Authentication Services
IKE Phase I Negotiation
IKE Phase II Negotiation
Configuring ISAKMP
IKE with RAVPN Extensions
Summary
Chapter 3 Basic IPsec VPN Topologies and Configurations
Site-to-Site IPsec VPN Deployments
Site-to-Site VPN Architectural Overview for a Dedicated Circuit
Site-to-Site Architectural Overview over a Routed Domain
Site-to-Site IPsec VPN Deployments and GRE (IPsec+GRE)
Site-to-Site IPsec+GRE Architectural Overview
Site-to-Site IPsec+GRE Sample Configurations
Hub-and-Spoke IPsec VPN Deployments
Hub-and-Spoke Architectural Overview
Standard Hub-and-Spoke Design without High Availability
Clustered Spoke Design to Redundant Hubs
Redundant Clustered Spoke Design to Redundant Hubs
Remote Access VPN Deployments
RAVPN Architectural Overview
RAVPN Clients
Standalone VPN Concentrator Designs
Clustered VPN Concentrator Designs
Summary
Chapter 4 Common IPsec VPN Issues
IPsec Diagnostic Tools within Cisco IOS
Common Configuration Issues with IPsec VPNs
IKE SA Proposal Mismatches
IKE Authentication Failures and Errors
IPsec SA Proposal Mismatches
Crypto-Protected Address Space Issues (Crypto ACL Errors)
Architectural and Design Issues with IPsec VPNs
Troubleshooting IPsec VPNs in Firewalled Environments
NAT Issues in IPsec VPN Designs
The Influence of IPsec on Traffic Flows Requiring QoS
Solving Fragmentation Issues in IPsec VPNs
The Effect of Recursive Routing on IPsec VPNs
Summary
Part II Designing VPN Architectures
Chapter 5 Designing for High Availability
Network and Path Redundancy
IPSec Tunnel Termination Redundancy
Multiple Physical Interface HA with Highly Available Tunnel Termination Interfaces
Tunnel Termination HA Using HSRP/VRRP Virtual Interfaces
HA with Multiple Peer Statements
RP-based IPSec HA
Managing Peer and Path Availability
Peer Availability
Path Availability
Managing Path Symmetry
Load Balancing, Load Sharing, and High Availability
Load-Sharing with Peer Statements
Routing
Domain Name System (DNS)
Cisco VPN3000 Concentrator Clustering
IPSec Session Load-Balancing Using External Load Balancers
Summary
Chapter 6 Solutions for Local Site-to-Site High Availability
Using Multiple Crypto Interfaces for High Availability
Impact of Routing Protocol Reconvergence on IPsec Reconvergence
Impact of Stale SAs on IPsec Reconvergence
Impact of IPsec and ISAKMP SA Renegotiation on IPsec Reconvergence
Stateless IPsec VPN High-Availability Alternatives
Solution Overview for Stateless IPsec High Availability
Stateless High Availability Failover Process
Stateful IPsec VPN High-Availability Alternatives
Solution Overview for Stateful IPsec High Availability
Stateful High Availability Failover Process
Summary
Stateless IPsec VPN High Availability Design Summary
Stateful IPsec VPN High Availability Design Summary
Chapter 7 Solutions for Geographic Site-to-Site High Availability
Geographic IPsec VPN HA with Reverse Route Injection and Multiple IPsec Peers
Solution Overview for RRI with Multiple IPsec Peers
Geographic IPsec VPN High Availability with IPsec+GRE and Encrypted Routing
Protocols
Solution Overview for IPsec+GRE with Encrypted Routing Protocols
Dynamic Multipoint Virtual Private Networks
DMVPN Solution Design Drivers
DMVPN Component-Level Overview and System Operation
Summary
Chapter 8 Handling Vendor Interoperability with High Availability
Vendor Interoperability Impact on Peer Availability
The Inability to Specify Multiple Peers
Lack of Peer Availability Mechanisms
Vendor Interoperability Impact on Path Availability
IPSec HA Design Considerations for Platforms with Limited Routing
Protocol Support
IPSec HA Design Considerations for Lack of RRI Support
IPSec HA Design Considerations for Lack of Generic Routing Encapsulation (GRE)
Support
Vendor Interoperability Design Considerations and Options
Phase 1 and 2 SA Lifetime Expiry
SADB Management with Quick Mode Delete Notify Messages
Invalid Security Parameter Index Recovery
Vendor Interoperability with Stateful IPSec HA
Summary
Chapter 9 Solutions for Remote-Access VPN High Availability
IPsec RAVPN Concentrator High Availability Using Virtual Interfaces for Tunnel
Termination
IPsec RAVPN Concentrator High Availability Using VRRP
IPsec RAVPN Concentrator HA Using HSRP
IPsec RAVPN Concentrator HA Using the VCA Protocol
IPsec RAVPN Geographic HA Design Options
VPN Concentrator Session Load Balancing Using DNS
VPN Concentrator Redundancy Using Multiple Peers
Summary
Chapter 10 Further Architectural Options for IPsec
IPsec VPN Termination On-a-Stick
IPsec with Router-on-a-Stick Design Overview
Case Study: Small Branch IPsec VPN Tunnel Termination with NAT On-a-Stick
In-Path Versus Out-of-Path Encryption with IPsec
Out-of-Path Encryption Design Overview
Case Study: Firewalled Site-to-Site IPsec VPN Tunnel Termination
Separate Termination of IPsec and GRE (GRE-Offload)
GRE-Offload Design Overview
Case Study: Large-Scale IPsec VPN Tunnel Termination with GRE Offload
Summary
Part III Advanced Topics
Chapter 11 Public Key Infrastructure and IPsec VPNs
PKI Background
PKI Components
Public Key Certificates
Registration Authorities
Certificate Revocation Lists and CRL Issuers
Certificate Authorities
PKI Cryptographic Endpoints
Life of a Public Key Certificate
RSA Signatures and X.509v3 Certificates
Generating Asymmetric Keypairs on Cryptographic Endpoints
Registration and Endpoint Authentication
Receipt and Authentication of the CA’s Certificate
Forwarding and Signing of Public Keys
Obtaining and Using Public Key Certificates
PKI and the IPSec Protocol Suite–Where PKI Fits into the IPSec model
OCSP and CRL Scalability
OCSP
Case Studies and Sample Configurations
Case Study 1: PKI Integration of Cryptographic Endpoints
Case Study 2: PKI with CA and RA
Case Study 3: PKI with Redundant CAs (CA Hierarchy)
Summary
Chapter 12 Solutions for Handling Dynamically Addressed Peers
Dynamic Crypto Maps
Dynamic Crypto Map Impact on VPN Behavior
Dynamic Crypto Map Configuration and Verification
Tunnel Endpoint Discovery
TED Configuration and Verification
Case Study–Using Dynamic Addressing with Low-Maintenance Small Home Office
Deployments
Summary
Appendix A Resources
Books
RFCs
Web and Other Resources
Index
商品描述(中文翻譯)
**描述**
介紹設計和配置 Cisco IPsec VPN 的基本知識。
- 了解 IPsec 協議的基本概念並學習實施最佳實踐
- 研究最新的 IPsec 設計,融入當前 Cisco 在安全和 VPN 市場的創新
- 學習如何避免與 IPsec 部署相關的常見陷阱
- 通過案例研究和配置範例加強理論,展示 IPsec 如何映射到現實世界的解決方案
《IPsec 虛擬私人網路基礎》提供了在各種 Cisco 路由和交換平台上對 IPsec 的基本工作知識。它提供了理解 Cisco IPsec 實施不同組件所需的基礎,並說明如何在各種網路拓撲和市場(服務提供商、企業、金融、政府)中成功實施。這本書將 IPsec 視為大多數主要垂直市場中出現的需求,解釋了對於安全傳輸機密數據所需的增強信息認證、保密性和不可否認性的必要性。該書採用分層的方法撰寫,首先解釋為何開發 IPsec 及依賴 IPsec 來保護數據傳輸的組織類型。然後概述了為滿足安全數據傳輸需求而開發的基本 IPsec/ISAKMP 基礎知識。該書涵蓋了使用一系列 Cisco 產品設計和實施 IPsec VPN 架構,從基本概念開始,逐步深入到更高級的主題,包括高可用性解決方案和公鑰基礎設施(PKI)。每章提供示例拓撲圖和配置範例,以加強文本中表達的基本概念,並幫助讀者將概念轉化為實際部署場景。此外,整本書中還融入了全面的案例研究,以將主題映射到現實世界的解決方案。
**目錄**
**內容**
引言
**第一部分 介紹概念與配置/故障排除**
第 1 章 介紹 VPN 技術
VPN 常見術語概述
有效 VPN 的特徵
VPN 技術
虛擬私人撥號網路
多協議標籤交換 VPN
IPsec VPN
傳輸層 VPN
常見 VPN 部署
站點對站點 VPN
遠端訪問 VPN
VPN 的商業驅動因素
遠端訪問 VPN 商業驅動因素 - 實用範例
站點對站點 VPN 商業驅動因素 - 實用範例
IPsec VPN 與 Cisco 安全框架
總結
第 2 章 IPsec 基礎
加密組件概述
非對稱加密
對稱加密
消息認證、消息完整性和發送者不可否認機制
公鑰加密方法
RSA 公鑰技術
Diffie-Hellman 密鑰交換
IP 安全協議 (IPsec)
IPsec 模式
IPsec 轉換
IPsec SA
IPsec 配置元素
手動密鑰管理
安全協議和密鑰管理的必要性
IKE 和 ISAKMP
IKE 和 ISAKMP 的術語及背景
IKE SA 協商和維護
使用 IKE 生成 IPsec Diffie-Hellman 共享密鑰
IKE 認證服務
IKE 第一階段協商
IKE 第二階段協商
配置 ISAKMP
帶有 RAVPN 擴展的 IKE
總結
第 3 章 基本 IPsec VPN 拓撲和配置
站點對站點 IPsec VPN 部署
專用電路的站點對站點 VPN 架構概述
路由域的站點對站點架構概述
站點對站點 IPsec VPN 部署和 GRE (IPsec+GRE)
站點對站點 IPsec+GRE 架構概述
站點對站點 IPsec+GRE 示例配置
中心-分支 IPsec VPN 部署
中心-分支架構概述
無高可用性的標準中心-分支設計
冗餘中心的集群分支設計
冗餘集群分支設計到冗餘中心
遠端訪問 VPN 部署
RAVPN 架構概述
RAVPN 客戶端
獨立 VPN 集中器設計
集群 VPN 集中器設計
總結
第 4 章 常見 IPsec VPN 問題
Cisco IOS 中的 IPsec 診斷工具
IPsec VPN 的常見配置問題
IKE SA 提案不匹配
IKE 認證失敗和錯誤
IPsec SA 提案不匹配
加密保護地址空間問題(加密 ACL 錯誤)
IPsec VPN 的架構和設計問題
在防火牆環境中故障排除 IPsec VPN
IPsec VPN 設計中的 NAT 問題
IPsec 對需要 QoS 的流量流的影響
解決 IPsec VPN 中的分段問題
遞歸路由對 IPsec VPN 的影響
總結
**第二部分 設計 VPN 架構**
第 5 章 設計高可用性
網路和路徑冗餘
IPSec 隧道終止冗餘
多物理介面 HA 與高可用的隧道終止介面
使用 HSRP/VRRP 虛擬介面的隧道終止 HA
具有多個對等聲明的 HA
基於 RP 的 IPSec HA
管理對等和路徑可用性
對等可用性
路徑可用性
管理路徑對稱性
負載平衡、負載共享和高可用性
使用對等聲明的負載共享
路由
域名系統 (DNS)
Cisco VPN3000 集中器集群
使用外部負載平衡器的 IPSec 會話負載平衡
總結
第 6 章 本地站點對站點高可用性的解決方案
使用多個加密介面實現高可用性
路由協議重新收斂對 IPsec 重新收斂的影響
過期 SA 對 IPsec 重新收斂的影響
IPsec 和 ISAKMP SA 重新協商對 IPsec 重新收斂的影響
無狀態 IPsec VPN 高可用性替代方案
無狀態 IPsec 高可用性解決方案概述
無狀態高可用性故障轉移過程
有狀態 IPsec VPN 高可用性替代方案
有狀態 IPsec 高可用性解決方案概述
有狀態高可用性故障轉移過程
總結
無狀態 IPsec VPN 高可用性設計總結
有狀態 IPsec VPN 高可用性設計總結
第 7 章 地理站點對站點高可用性的解決方案
地理 IPsec VPN HA 與反向路由注入和多個 IPsec 對等
帶有多個 IPsec 對等的 RRI 解決方案概述
帶有 IPsec+GRE 和加密路由的地理 IPsec VPN 高可用性
協議
帶有加密路由的 IPsec+GRE 解決方案概述