The Bottom Line
- VPN benefits and limitations reviewed without hype
- Superior coverage of encryption and key management
- Clear explanations of VPN systems architectures
- Limited coverage of VPN products or case studies
- Chapter 1 defines VPNs and explains the basic principles of how they work.
- Chapter 2 explains the use of VPNs for remote access, as an intranet, or as an extranet.
- Chapter 3 reveals the potential pitfalls of VPNs.
- Chapter 4 compares Internet-based VPNs to those that utilize alternative public networks.
- Chapters 5-6 describe encryption, authentication, authorization and key management for VPNs.
- Chapters 7-8 explain tunneling, VPN packet protocols and architectural considerations.
- Chapters 9-10 present ideas useful for planning and administering a VPN deployment.
- Additional sections include a list of Web site resources, a glossary and a bibliography.
Guide Review - "Virtual Private Networks" by Dennis Fowler
VPNs require careful planning on behalf of the companies that choose to implement them. This book offers the network architect, project manager, or engineer the information they need to understand the potential of and issues associated with Virtual Private Networks.