did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780890064474

Practical Guide for Implementing Secure Intranets and Extranets

by ;
  • ISBN13:

    9780890064474

  • ISBN10:

    0890064474

  • Format: Hardcover
  • Copyright: 1999-11-01
  • Publisher: Artech House
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $99.00

Summary

This invaluable new book provides hands-on methodology for designing effective network-level security systems for your corporate intranet or extranet. Using real-world examples and referencing the latest intranet and extranet technology, this essential guidebook for IT professionals shows how to configure network and security elements such as routers, switches, servers and firewalls to achieve top-notch security.

Author Biography

Kaustubh M. Phaltankar is chairman of NetPlexus in Springfield, Virginia, specializing in high resiliency architecture for network implementations and security of intranets and extranets.

Table of Contents

Forewordp. xiii
Prefacep. xv
Intended Audiencep. xvii
Book Layoutp. xvii
Web Sitep. xviii
Acknowledgmentsp. xix
Conventionsp. xix
Introductionp. 1
Internetp. 1
Intranetp. 3
Traditional Approachp. 5
Frame Relay-Based Approachp. 7
Internet VPN-Based Approachp. 9
Intranet Componentsp. 11
Intranet Summaryp. 14
Extranetp. 16
Advantages of Extranetp. 17
Securityp. 19
Examples of Extranetp. 23
Conclusionp. 28
Wide Area Network Componentsp. 29
Asynchronous Dial-Up Connections On-Demand Using the Public Switched Telephone Networkp. 32
Dedicated Digital Point-to-Point Serial Connection to an Internet Service Providerp. 32
Point-to-Point Protocolp. 34
PPP Operationp. 35
Packet-Switched Technologies Like X.25, Frame Relay, ATM, and SMDSp. 37
X.25p. 37
Frame Relayp. 39
Asynchronous Transfer Modep. 44
Switched Multimegabit Data Servicep. 49
Integrated Services Digital Networkp. 51
ISDN Physical Setupp. 52
Basic Rate Interfacep. 54
Primary Rate Interfacep. 55
Applications of ISDNp. 55
Security Features of ISDNp. 57
Signaling System Number 7p. 57
WAN Topologies and Resiliency Considerationsp. 57
WAN Topologiesp. 58
Conclusionp. 60
Local Area Network Componentsp. 61
Ethernetp. 62
Bridgesp. 65
Routersp. 66
Fast Ethernet (100BaseT)p. 67
Ethernet Switch (Layer 2 Switch)p. 69
Switch Operationp. 70
Virtual LANsp. 73
Hot-Standby Routing Protocolp. 74
Gigabit Ethernetp. 76
Fiber Distributed Data Interfacep. 77
Infrastructurep. 77
ATM in the LAN Environmentp. 80
LAN Architecture and Operationp. 80
Multiprotocol Over ATMp. 86
Token Ringp. 88
Token Ring Operationp. 90
Layer 3 Switchingp. 90
LAN Routing Protocolsp. 91
Staticp. 91
Distance Vector Routing Protocolp. 94
Link State Routing Protocolp. 98
LAN QOSp. 99
Conclusionp. 100
Network and Service Managementp. 101
Network Managementp. 101
OSI FCAPS Modelp. 101
SNMPp. 102
Management Information Basep. 106
Structured Management Informationp. 108
SNMP Commandsp. 109
SNMP Product Offeringsp. 109
Remote Network Monitoringp. 111
RMON-IIp. 114
RMON Product Offeringsp. 116
Service Managementp. 118
Conclusionp. 119
Security Components of Intranets and Extranetsp. 121
Security Framework for Intranet and Extranetp. 122
Developing a Security Planp. 129
Security Toolsp. 130
Preventionp. 130
Detectionp. 132
Correctionp. 132
Data Securityp. 132
Data Confidentialityp. 134
Data Integrityp. 138
Data Access Control and Authenticationp. 140
Authenticationp. 142
Firewallsp. 172
Origin of Firewallsp. 172
What Is the Role of a Firewall in an Intranet or an Extranet?p. 172
What Are the Different Types of Firewalls?p. 174
Conclusionp. 182
Virtual Private Networkp. 183
What Is VPN?p. 183
LAN-to-LAN VPN for Connecting Various Parts of an Intranetp. 184
LAN-to-WAN VPN for Extending an Intranet to External Entities to Form Extranetsp. 184
Remote-LAN-Dial VPDN for Accessing Intranet and Extranet Applicationsp. 184
Why VPN?p. 186
Lower Cost of Deploymentp. 186
Data Privacyp. 186
Ubiquitous Accessp. 186
Deployment Flexibilityp. 187
Implementation Scalabilityp. 187
VPN Implementation for Intranet and Extranetp. 187
Securityp. 188
Performancep. 189
Ease of Managementp. 190
Conformance to Standards and Interoperabilityp. 191
Network-to-Network Connectionp. 191
Data Link Layerp. 192
Network Layerp. 198
Session Layerp. 207
Application Layer VPN Solutionp. 209
Dial-to-LAN VPDN Connectionp. 210
Conclusionp. 221
Case Studiesp. 223
Case Study I: Intranet in a Company Having a Single Office Locationp. 224
Case Study Objectivep. 224
Case Study Background and Requirementsp. 224
Conclusionp. 238
Case Study II: Intranet in a Company Having Multiple Office Locations Spread Over a Wide Geographical Areap. 238
Case Study Objectivep. 238
Cast Study Background and Requirementsp. 239
Conclusionp. 256
Case Study III: Intranet in a Company With a Legacy X.25 Connection to Its Operations in Europep. 256
Case Study Objectivep. 256
Case Study Background and Requirementsp. 261
Conclusionp. 308
Case Study IV: Intranet in a Company With a Legacy Connection to an IBM Mainframe System Using SNAp. 309
Case Study Objectivep. 309
Case Study Background and Requirementsp. 309
Conclusionp. 320
Case Study V: Intranet Connectivity in a Company Using Internet-Based VPNp. 321
Case Study Objectivep. 321
Case Study Background and Requirementsp. 322
Conclusionp. 341
Case Study VI: Remote Access to the Intranet Using Internet-Based VPNp. 341
Case Study Objectivep. 341
Case Study Background and Requirementsp. 341
Conclusionp. 359
Case Study VII: Extranet Access via VPNp. 359
Case Study Objectivep. 359
Case Study Background and Requirementsp. 360
Conclusionp. 375
List of Acronyms and Abbreviationsp. 377
Bibliographyp. 383
About the Authorp. 385
Indexp. 387
Table of Contents provided by Syndetics. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program