Qua quá trình tìm tòi tài liệu và nghiên cứu: EM phải công nhận một điều, đây là tài liệu NGON LÀNH NHẤT về VPN (theo em), đặc biệt khi ứng dụng cho các thiết bị của Cisco,
Tài liệu này mô tả chi tiết từng pha, từng câu lệnh và quá trình thực hiện một bài LAB VPN như thế nào.
Các bác vào tham khảo nhé
The Complete Cisco VPN Configuration Guide
By Richard Deal
...............................................
Publisher: Cisco Press
Pub Date: December 15, 2005
ISBN: 1-58705-204-0
Pages: 1032
Table of Contents | Index
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Introduction
Goals and Methods
Who Should Read This Book?
How This Book Is Organized
Additional Information
Part I: VPNs
Chapter 1. Overview of VPNs
Traffic Issues
VPN Definition
VPN Components
VPN Designs
VPN Implementations
VPNs: Choosing a Solution
Summary
Chapter 2. VPN Technologies
Keys
Encryption
Packet Authentication
Key Exchange
Authentication Methods
Summary
Chapter 3. IPsec
IPsec Standards
ISAKMP/IKE Phase 1
ISAKMP/IKE Phase 2
IPsec Traffic and Networks
Summary
Chapter 4. PPTP and L2TP
PPTP
L2TP
Summary
Chapter 5. SSL VPNs
SSL Overview
When to Use SSL VPNs
Cisco WebVPN Solution
Summary
Part II: Concentrators
Chapter 6. Concentrator Product Information
Concentrator Models
Concentrator Modules
Concentrator Features
Introduction to Accessing a Concentrator
Summary
Chapter 7. Concentrator Remote Access Connections with IPsec
Controlling Remote Access Sessions to the Concentrator
IPsec Remote Access
Network Access Control (NAC) for IPsec and L2TP/IPsec Users
Summary
Chapter 8. Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
PPTP and L2TP Remote Access
WebVPN Remote Access
Summary
Chapter 9. Concentrator Site-to-Site Connections
L2L Connectivity Example
ISAKMP/IKE Phase 1 Preparation
Adding Site-to-Site Connections
Address Translation and L2L Sessions
Summary
Chapter 10. Concentrator Management
Bandwidth Management
Routing on the Concentrator
Chassis Redundancy
Administration Screens
Summary
Chapter 11. Verifying and Troubleshooting Concentrator Connections
Concentrator Tools
Troubleshooting Problems
Summary
Part III: Clients
Chapter 12. Cisco VPN Software Client
Cisco VPN Client Overview
Cisco VPN Client Interface
IPsec Connections
VPN Client GUI Options
VPN Client Software Updates
VPN Client Troubleshooting
Summary
Chapter 13. Windows Software Client
Windows Client
Configuring the Windows VPN Client
Configuring the VPN 3000 Concentrator
Microsoft Client Connections
Troubleshooting VPN Connections
Summary
Chapter 14. 3002 Hardware Client
Overview of the 3002 Hardware Client
Initial Access to the 3002
Authentication and Connection Options
Connection Modes
Administrative Tasks
Summary
Part IV: IOS Routers
Chapter 15. Router Product Information
Router Deployment Scenarios
Router Product Overview
Summary
Chapter 16. Router ISAKMP/IKE Phase 1 Connectivity
IPsec Preparation
ISAKMP/IKE Phase 1 Policies
ISAKMP/IKE Phase 1 Device Authentication
Monitoring and Managing Management Connections
Routers as Certificate Authorities
Summary
Chapter 17. Router Site-to-Site Connections
ISAKMP/IKE Phase 2 Configuration
Viewing and Managing Connections
Issues with Site-to-Site Connections
Summary
Chapter 18. Router Remote Access Connections
Easy VPN Server
Easy VPN Remote
IPsec Remote Access and L2L Sessions on the Same Router
WebVPN
Summary
Chapter 19. Troubleshooting Router Connections
ISAKMP/IKE Phase 1 Connections
ISAKMP/IKE Phase 2 Connections
New IPsec Troubleshooting Features
Fragmentation Problems
Summary
Part V: PIX Firewalls
Chapter 20. PIX and ASA Product Information
PIX Deployment Scenarios
PIX and ASA Feature and Product Overview
Summary
Chapter 21. PIX and ASA Site-to-Site Connections
ISAKMP/IKE Phase 1 Management Connection
ISAKMP/IKE Phase 2 Data Connections
L2L Connection Examples
Summary
Chapter 22. PIX and ASA Remote Access Connections
Easy VPN Server Support for 6.x
Easy VPN Remote Support for 6.x
Easy VPN Server Support for 7.0
Summary
Chapter 23. Troubleshooting PIX and ASA Connections
ISAKMP/IKE Phase 1 Connections
ISAKMP/IKE Phase 2 Connections
Summary
Part VI: Case Study
Chapter 24. Case Study
Company Profile
Case Study Configuration
Summary
Index
Tài liệu này mô tả chi tiết từng pha, từng câu lệnh và quá trình thực hiện một bài LAB VPN như thế nào.
Các bác vào tham khảo nhé
The Complete Cisco VPN Configuration Guide
By Richard Deal
...............................................
Publisher: Cisco Press
Pub Date: December 15, 2005
ISBN: 1-58705-204-0
Pages: 1032
Table of Contents | Index
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Introduction
Goals and Methods
Who Should Read This Book?
How This Book Is Organized
Additional Information
Part I: VPNs
Chapter 1. Overview of VPNs
Traffic Issues
VPN Definition
VPN Components
VPN Designs
VPN Implementations
VPNs: Choosing a Solution
Summary
Chapter 2. VPN Technologies
Keys
Encryption
Packet Authentication
Key Exchange
Authentication Methods
Summary
Chapter 3. IPsec
IPsec Standards
ISAKMP/IKE Phase 1
ISAKMP/IKE Phase 2
IPsec Traffic and Networks
Summary
Chapter 4. PPTP and L2TP
PPTP
L2TP
Summary
Chapter 5. SSL VPNs
SSL Overview
When to Use SSL VPNs
Cisco WebVPN Solution
Summary
Part II: Concentrators
Chapter 6. Concentrator Product Information
Concentrator Models
Concentrator Modules
Concentrator Features
Introduction to Accessing a Concentrator
Summary
Chapter 7. Concentrator Remote Access Connections with IPsec
Controlling Remote Access Sessions to the Concentrator
IPsec Remote Access
Network Access Control (NAC) for IPsec and L2TP/IPsec Users
Summary
Chapter 8. Concentrator Remote Access Connections with PPTP, L2TP, and WebVPN
PPTP and L2TP Remote Access
WebVPN Remote Access
Summary
Chapter 9. Concentrator Site-to-Site Connections
L2L Connectivity Example
ISAKMP/IKE Phase 1 Preparation
Adding Site-to-Site Connections
Address Translation and L2L Sessions
Summary
Chapter 10. Concentrator Management
Bandwidth Management
Routing on the Concentrator
Chassis Redundancy
Administration Screens
Summary
Chapter 11. Verifying and Troubleshooting Concentrator Connections
Concentrator Tools
Troubleshooting Problems
Summary
Part III: Clients
Chapter 12. Cisco VPN Software Client
Cisco VPN Client Overview
Cisco VPN Client Interface
IPsec Connections
VPN Client GUI Options
VPN Client Software Updates
VPN Client Troubleshooting
Summary
Chapter 13. Windows Software Client
Windows Client
Configuring the Windows VPN Client
Configuring the VPN 3000 Concentrator
Microsoft Client Connections
Troubleshooting VPN Connections
Summary
Chapter 14. 3002 Hardware Client
Overview of the 3002 Hardware Client
Initial Access to the 3002
Authentication and Connection Options
Connection Modes
Administrative Tasks
Summary
Part IV: IOS Routers
Chapter 15. Router Product Information
Router Deployment Scenarios
Router Product Overview
Summary
Chapter 16. Router ISAKMP/IKE Phase 1 Connectivity
IPsec Preparation
ISAKMP/IKE Phase 1 Policies
ISAKMP/IKE Phase 1 Device Authentication
Monitoring and Managing Management Connections
Routers as Certificate Authorities
Summary
Chapter 17. Router Site-to-Site Connections
ISAKMP/IKE Phase 2 Configuration
Viewing and Managing Connections
Issues with Site-to-Site Connections
Summary
Chapter 18. Router Remote Access Connections
Easy VPN Server
Easy VPN Remote
IPsec Remote Access and L2L Sessions on the Same Router
WebVPN
Summary
Chapter 19. Troubleshooting Router Connections
ISAKMP/IKE Phase 1 Connections
ISAKMP/IKE Phase 2 Connections
New IPsec Troubleshooting Features
Fragmentation Problems
Summary
Part V: PIX Firewalls
Chapter 20. PIX and ASA Product Information
PIX Deployment Scenarios
PIX and ASA Feature and Product Overview
Summary
Chapter 21. PIX and ASA Site-to-Site Connections
ISAKMP/IKE Phase 1 Management Connection
ISAKMP/IKE Phase 2 Data Connections
L2L Connection Examples
Summary
Chapter 22. PIX and ASA Remote Access Connections
Easy VPN Server Support for 6.x
Easy VPN Remote Support for 6.x
Easy VPN Server Support for 7.0
Summary
Chapter 23. Troubleshooting PIX and ASA Connections
ISAKMP/IKE Phase 1 Connections
ISAKMP/IKE Phase 2 Connections
Summary
Part VI: Case Study
Chapter 24. Case Study
Company Profile
Case Study Configuration
Summary
Index
Comment