Foreword | p. xiii |
Preface | p. xv |
Intended Audience | p. xvii |
Book Layout | p. xvii |
Web Site | p. xviii |
Acknowledgments | p. xix |
Conventions | p. xix |
Introduction | p. 1 |
Internet | p. 1 |
Intranet | p. 3 |
Traditional Approach | p. 5 |
Frame Relay-Based Approach | p. 7 |
Internet VPN-Based Approach | p. 9 |
Intranet Components | p. 11 |
Intranet Summary | p. 14 |
Extranet | p. 16 |
Advantages of Extranet | p. 17 |
Security | p. 19 |
Examples of Extranet | p. 23 |
Conclusion | p. 28 |
Wide Area Network Components | p. 29 |
Asynchronous Dial-Up Connections On-Demand Using the Public Switched Telephone Network | p. 32 |
Dedicated Digital Point-to-Point Serial Connection to an Internet Service Provider | p. 32 |
Point-to-Point Protocol | p. 34 |
PPP Operation | p. 35 |
Packet-Switched Technologies Like X.25, Frame Relay, ATM, and SMDS | p. 37 |
X.25 | p. 37 |
Frame Relay | p. 39 |
Asynchronous Transfer Mode | p. 44 |
Switched Multimegabit Data Service | p. 49 |
Integrated Services Digital Network | p. 51 |
ISDN Physical Setup | p. 52 |
Basic Rate Interface | p. 54 |
Primary Rate Interface | p. 55 |
Applications of ISDN | p. 55 |
Security Features of ISDN | p. 57 |
Signaling System Number 7 | p. 57 |
WAN Topologies and Resiliency Considerations | p. 57 |
WAN Topologies | p. 58 |
Conclusion | p. 60 |
Local Area Network Components | p. 61 |
Ethernet | p. 62 |
Bridges | p. 65 |
Routers | p. 66 |
Fast Ethernet (100BaseT) | p. 67 |
Ethernet Switch (Layer 2 Switch) | p. 69 |
Switch Operation | p. 70 |
Virtual LANs | p. 73 |
Hot-Standby Routing Protocol | p. 74 |
Gigabit Ethernet | p. 76 |
Fiber Distributed Data Interface | p. 77 |
Infrastructure | p. 77 |
ATM in the LAN Environment | p. 80 |
LAN Architecture and Operation | p. 80 |
Multiprotocol Over ATM | p. 86 |
Token Ring | p. 88 |
Token Ring Operation | p. 90 |
Layer 3 Switching | p. 90 |
LAN Routing Protocols | p. 91 |
Static | p. 91 |
Distance Vector Routing Protocol | p. 94 |
Link State Routing Protocol | p. 98 |
LAN QOS | p. 99 |
Conclusion | p. 100 |
Network and Service Management | p. 101 |
Network Management | p. 101 |
OSI FCAPS Model | p. 101 |
SNMP | p. 102 |
Management Information Base | p. 106 |
Structured Management Information | p. 108 |
SNMP Commands | p. 109 |
SNMP Product Offerings | p. 109 |
Remote Network Monitoring | p. 111 |
RMON-II | p. 114 |
RMON Product Offerings | p. 116 |
Service Management | p. 118 |
Conclusion | p. 119 |
Security Components of Intranets and Extranets | p. 121 |
Security Framework for Intranet and Extranet | p. 122 |
Developing a Security Plan | p. 129 |
Security Tools | p. 130 |
Prevention | p. 130 |
Detection | p. 132 |
Correction | p. 132 |
Data Security | p. 132 |
Data Confidentiality | p. 134 |
Data Integrity | p. 138 |
Data Access Control and Authentication | p. 140 |
Authentication | p. 142 |
Firewalls | p. 172 |
Origin of Firewalls | p. 172 |
What Is the Role of a Firewall in an Intranet or an Extranet? | p. 172 |
What Are the Different Types of Firewalls? | p. 174 |
Conclusion | p. 182 |
Virtual Private Network | p. 183 |
What Is VPN? | p. 183 |
LAN-to-LAN VPN for Connecting Various Parts of an Intranet | p. 184 |
LAN-to-WAN VPN for Extending an Intranet to External Entities to Form Extranets | p. 184 |
Remote-LAN-Dial VPDN for Accessing Intranet and Extranet Applications | p. 184 |
Why VPN? | p. 186 |
Lower Cost of Deployment | p. 186 |
Data Privacy | p. 186 |
Ubiquitous Access | p. 186 |
Deployment Flexibility | p. 187 |
Implementation Scalability | p. 187 |
VPN Implementation for Intranet and Extranet | p. 187 |
Security | p. 188 |
Performance | p. 189 |
Ease of Management | p. 190 |
Conformance to Standards and Interoperability | p. 191 |
Network-to-Network Connection | p. 191 |
Data Link Layer | p. 192 |
Network Layer | p. 198 |
Session Layer | p. 207 |
Application Layer VPN Solution | p. 209 |
Dial-to-LAN VPDN Connection | p. 210 |
Conclusion | p. 221 |
Case Studies | p. 223 |
Case Study I: Intranet in a Company Having a Single Office Location | p. 224 |
Case Study Objective | p. 224 |
Case Study Background and Requirements | p. 224 |
Conclusion | p. 238 |
Case Study II: Intranet in a Company Having Multiple Office Locations Spread Over a Wide Geographical Area | p. 238 |
Case Study Objective | p. 238 |
Cast Study Background and Requirements | p. 239 |
Conclusion | p. 256 |
Case Study III: Intranet in a Company With a Legacy X.25 Connection to Its Operations in Europe | p. 256 |
Case Study Objective | p. 256 |
Case Study Background and Requirements | p. 261 |
Conclusion | p. 308 |
Case Study IV: Intranet in a Company With a Legacy Connection to an IBM Mainframe System Using SNA | p. 309 |
Case Study Objective | p. 309 |
Case Study Background and Requirements | p. 309 |
Conclusion | p. 320 |
Case Study V: Intranet Connectivity in a Company Using Internet-Based VPN | p. 321 |
Case Study Objective | p. 321 |
Case Study Background and Requirements | p. 322 |
Conclusion | p. 341 |
Case Study VI: Remote Access to the Intranet Using Internet-Based VPN | p. 341 |
Case Study Objective | p. 341 |
Case Study Background and Requirements | p. 341 |
Conclusion | p. 359 |
Case Study VII: Extranet Access via VPN | p. 359 |
Case Study Objective | p. 359 |
Case Study Background and Requirements | p. 360 |
Conclusion | p. 375 |
List of Acronyms and Abbreviations | p. 377 |
Bibliography | p. 383 |
About the Author | p. 385 |
Index | p. 387 |
Table of Contents provided by Syndetics. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.