EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Advanced IPSEC VPN Architecture and Design

Download or read book Advanced IPSEC VPN Architecture and Design written by Vijay Bollapragada and published by . This book was released on 2003 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book IPSec VPN Design

    Book Details:
  • Author : Vijay Bollapragada
  • Publisher : Cisco Press
  • Release : 2005-03-29
  • ISBN : 0134384164
  • Pages : 678 pages

Download or read book IPSec VPN Design written by Vijay Bollapragada and published by Cisco Press. This book was released on 2005-03-29 with total page 678 pages. Available in PDF, EPUB and Kindle. Book excerpt: The definitive design and deployment guide for secure virtual private networks Learn about IPSec protocols and Cisco IOS IPSec packet processing Understand the differences between IPSec tunnel mode and transport mode Evaluate the IPSec features that improve VPN scalability and fault tolerance, such as dead peer detection and control plane keepalives Overcome the challenges of working with NAT and PMTUD Explore IPSec remote-access features, including extended authentication, mode-configuration, and digital certificates Examine the pros and cons of various IPSec connection models such as native IPSec, GRE, and remote access Apply fault tolerance methods to IPSec VPN designs Employ mechanisms to alleviate the configuration complexity of a large- scale IPSec VPN, including Tunnel End-Point Discovery (TED) and Dynamic Multipoint VPNs (DMVPN) Add services to IPSec VPNs, including voice and multicast Understand how network-based VPNs operate and how to integrate IPSec VPNs with MPLS VPNs Among the many functions that networking technologies permit is the ability for organizations to easily and securely communicate with branch offices, mobile users, telecommuters, and business partners. Such connectivity is now vital to maintaining a competitive level of business productivity. Although several technologies exist that can enable interconnectivity among business sites, Internet-based virtual private networks (VPNs) have evolved as the most effective means to link corporate network resources to remote employees, offices, and mobile workers. VPNs provide productivity enhancements, efficient and convenient remote access to network resources, site-to-site connectivity, a high level of security, and tremendous cost savings. IPSec VPN Design is the first book to present a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. Divided into three parts, the book provides a solid understanding of design and architectural issues of large-scale, secure VPN solutions. Part I includes a comprehensive introduction to the general architecture of IPSec, including its protocols and Cisco IOS® IPSec implementation details. Part II examines IPSec VPN design principles covering hub-and-spoke, full-mesh, and fault-tolerant designs. This part of the book also covers dynamic configuration models used to simplify IPSec VPN designs. Part III addresses design issues in adding services to an IPSec VPN such as voice and multicast. This part of the book also shows you how to effectively integrate IPSec VPNs with MPLS VPNs. IPSec VPN Design provides you with the field-tested design and configuration advice to help you deploy an effective and secure VPN solution in any environment. This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Book IPSec VPN Design

Download or read book IPSec VPN Design written by Vijay Bollapragada and published by . This book was released on 2005 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: "IPSec VPN Design is the first book to present a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. - Divided into three parts, the book provides a solid understanding of design and architectural issues of large-scale, secure VPN solutions. Part I includes a comprehensive introduction to the general architecture of IPSec, including its protocols and Cisco IOS IPSec implementation details. - Part II examines IPSec VPN design principles covering hub-and-spoke, full-mesh, and fault-tolerant designs. This part of the book also covers dynamic configuration models used to simplify IPSec VPN designs. Part III addresses design issues in adding services to an IPSec VPN such as voice and multicast. - This part of the book also shows you how to effectively integrate IPSec VPNs with MPLS VPNs."--Jacket.

Book IPSec Virtual Private Network Fundamentals

Download or read book IPSec Virtual Private Network Fundamentals written by James Henry Carmouche and published by Pearson Education. This book was released on 2006-07-19 with total page 546 pages. Available in PDF, EPUB and Kindle. Book excerpt: An introduction to designing and configuring Cisco IPsec VPNs Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutions IPsec Virtual Private Network Fundamentals provides a basic working knowledge of IPsec on various Cisco routing and switching platforms. It provides the foundation necessary to understand the different components of Cisco IPsec implementation and how it can be successfully implemented in a variety of network topologies and markets (service provider, enterprise, financial, government). This book views IPsec as an emerging requirement in most major vertical markets, explaining the need for increased information authentication, confidentiality, and non-repudiation for secure transmission of confidential data. The book is written using a layered approach, starting with basic explanations of why IPsec was developed and the types of organizations relying on IPsec to secure data transmissions. It then outlines the basic IPsec/ISAKMP fundamentals that were developed to meet demand for secure data transmission. The book covers the design and implementation of IPsec VPN architectures using an array of Cisco products, starting with basic concepts and proceeding to more advanced topics including high availability solutions and public key infrastructure (PKI). Sample topology diagrams and configuration examples are provided in each chapter to reinforce the fundamentals expressed in text and to assist readers in translating concepts into practical deployment scenarios. Additionally, comprehensive case studies are incorporated throughout to map topics to real-world solutions.

Book Advanced MPLS Design and Implementation

Download or read book Advanced MPLS Design and Implementation written by Vivek Alwayn and published by Cisco Press. This book was released on 2001 with total page 520 pages. Available in PDF, EPUB and Kindle. Book excerpt: An in-depth guide to understanding advanced MPLS implementation, including packet-based VPNs, ATM-based VPNs, traffic engineering, and quality of service "Advanced MPLS Design and Implementation" enables you to: Understand MPLS through a detailed analysis of MPLS architecture and operationDesign and implement packet-based MPLS Virtual Private Networks (VPNs) using label switching routers (LSRs)Design and implement ATM-based MPLS VPNs using WAN-switched ATM LSRsImplement MPLS traffic engineering on your core network and optimize traffic flows dynamicallyImplement MPLS QoS and provide hard service guarantees with multiple classes of serviceAcquire practical design and implementation knowledge of real-world MPLS VPNs, TE, and QoS through case studies and configuration examples Multiprotocol Label Switching (MPLS) is a highly scalable, high-performance forwarding technology that has multiple applications in the service provider and enterprise environment. This book is intended for internetwork engineers and administrators who are responsible for designing, implementing, and supporting service provider or enterprise MPLS backbone networks. It contains a broad range of technical details on MPLS and its associated protocols, packet-based MPLS, ATM-based MPLS, MPLS traffic engineering, MPLS QoS, MPLS design, and advanced MPLS architectures. This book contains MPLS theory, design, configuration, and various case studies. Use this book as a reference and guide for designing, implementing, and supporting an MPLS network. Even if you're not using Cisco(r) equipment, this book can increase your awareness and understanding of MPLS technology as well as provide you with detailed designconcepts and rules for building scalable MPLS networks. "Advanced MPLS Design and Implementation" is your guide to understanding, designing, and implementing MPLS VPNs, WAN-switched MPLS VPNs, MPLS traffic engineering, and MPLS QoS.

Book IKEv2 IPsec Virtual Private Networks

Download or read book IKEv2 IPsec Virtual Private Networks written by Graham Bartlett and published by Cisco Press. This book was released on 2016-08-10 with total page 1639 pages. Available in PDF, EPUB and Kindle. Book excerpt: Create and manage highly-secure Ipsec VPNs with IKEv2 and Cisco FlexVPN The IKEv2 protocol significantly improves VPN security, and Cisco’s FlexVPN offers a unified paradigm and command line interface for taking full advantage of it. Simple and modular, FlexVPN relies extensively on tunnel interfaces while maximizing compatibility with legacy VPNs. Now, two Cisco network security experts offer a complete, easy-tounderstand, and practical introduction to IKEv2, modern IPsec VPNs, and FlexVPN. The authors explain each key concept, and then guide you through all facets of FlexVPN planning, deployment, migration, configuration, administration, troubleshooting, and optimization. You’ll discover how IKEv2 improves on IKEv1, master key IKEv2 features, and learn how to apply them with Cisco FlexVPN. IKEv2 IPsec Virtual Private Networks offers practical design examples for many common scenarios, addressing IPv4 and IPv6, servers, clients, NAT, pre-shared keys, resiliency, overhead, and more. If you’re a network engineer, architect, security specialist, or VPN administrator, you’ll find all the knowledge you need to protect your organization with IKEv2 and FlexVPN. Understand IKEv2 improvements: anti-DDoS cookies, configuration payloads, acknowledged responses, and more Implement modern secure VPNs with Cisco IOS and IOS-XE Plan and deploy IKEv2 in diverse real-world environments Configure IKEv2 proposals, policies, profiles, keyrings, and authorization Use advanced IKEv2 features, including SGT transportation and IKEv2 fragmentation Understand FlexVPN, its tunnel interface types, and IOS AAA infrastructure Implement FlexVPN Server with EAP authentication, pre-shared keys, and digital signatures Deploy, configure, and customize FlexVPN clients Configure, manage, and troubleshoot the FlexVPN Load Balancer Improve FlexVPN resiliency with dynamic tunnel source, backup peers, and backup tunnels Monitor IPsec VPNs with AAA, SNMP, and Syslog Troubleshoot connectivity, tunnel creation, authentication, authorization, data encapsulation, data encryption, and overlay routing Calculate IPsec overhead and fragmentation Plan your IKEv2 migration: hardware, VPN technologies, routing, restrictions, capacity, PKI, authentication, availability, and more

Book Designing for Cisco Network Service Architectures  ARCH  Foundation Learning Guide

Download or read book Designing for Cisco Network Service Architectures ARCH Foundation Learning Guide written by Marwan Al-shawi and published by Cisco Press. This book was released on 2016-12-27 with total page 1343 pages. Available in PDF, EPUB and Kindle. Book excerpt: Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Fourth Edition · Learn about the Cisco modular enterprise architecture · Create highly available enterprise network designs · Develop optimum Layer 3 designs · Examine advanced WAN services design considerations · Evaluate data center design considerations · Design effective modern WAN and data center designs · Develop effective migration approaches to IPv6 · Design resilient IP multicast networks · Create effective network security designs Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Fourth Edition, is a Cisco-authorized, self-paced learning tool for CCDP foundation learning. This book provides you with the knowledge needed to perform the conceptual, intermediate, and detailed design of a network infrastructure that supports desired network solutions over intelligent network services to achieve effective performance, scalability, and availability. This book presents concepts and examples necessary to design converged enterprise networks. You learn additional aspects of modular campus design, advanced routing designs, WAN service designs, enterprise data center design, IP multicast design, and security design. Advanced and modern network infrastructure solutions, such as virtual private networks (VPN), Cisco Intelligent WAN (IWAN), and Cisco Application-Centric Infrastructure (ACI), are also covered. Chapter-ending review questions illustrate and help solidify the concepts presented in the book. Whether you are preparing for CCDP certification or CCDE certification, or simply want to gain a better understanding of designing scalable and reliable network architectures, you will benefit from the foundation information presented in this book. Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Fourth Edition, is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit https://learningnetwork.cisco.com. Category: Cisco Certification Covers: CCDP ARCH 300-320

Book MPLS based VPNs

Download or read book MPLS based VPNs written by Peter Tomsu and published by . This book was released on 2002 with total page 232 pages. Available in PDF, EPUB and Kindle. Book excerpt: This guide for network engineers describe the design, deployment, and management of Multiprotocol Label Switching (MPLS). The book explains how MPLS virtual private networks (VPNs) function and compares MPLS to other approaches. Route distribution, VPN topologies, encapsulation, label distribution, and other techniques and features are covered. Numerous charts and diagrams are featured. Tomsu is a consulting engineer. Wieser is a systems engineer. c. Book News Inc.

Book Comparing  Designing  and Deploying VPNs

Download or read book Comparing Designing and Deploying VPNs written by Mark Lewis (CCIE.) and published by Adobe Press. This book was released on 2006 with total page 1082 pages. Available in PDF, EPUB and Kindle. Book excerpt: A detailed guide for deploying PPTP, L2TPv2, L2TPv3, MPLS Layer-3, AToM, VPLS and IPSec virtual private networks.

Book MPLS and VPN Architectures

Download or read book MPLS and VPN Architectures written by Jim Guichard and published by Cisco Press. This book was released on 2003 with total page 514 pages. Available in PDF, EPUB and Kindle. Book excerpt: Master advanced MPLS VPN deployment solutions to design, deploy, and troubleshoot advanced or large-scale networks. This title builds on the bestselling success of the first volume with more advanced features to get more out of a network.

Book IPsec Virtual Private Network Fundamentals

Download or read book IPsec Virtual Private Network Fundamentals written by Carmouche and published by . This book was released on 1900 with total page 481 pages. Available in PDF, EPUB and Kindle. Book excerpt: This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. An introduction to designing and configuring Cisco IPsec VPNs Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutions IPsec Virtual Private N.

Book Designing Cisco Network Service Architectures  ARCH

Download or read book Designing Cisco Network Service Architectures ARCH written by John Tiso and published by Cisco Press. This book was released on 2012 with total page 735 pages. Available in PDF, EPUB and Kindle. Book excerpt: Designing Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Third Edition, is a Cisco(R)-authorized, self-paced learning tool for CCDP(R) foundation learning. This book provides you with the knowledge needed to perform the conceptual, intermediate, and detailed design of a network infrastructure that supports desired network solutions over intelligent network services, in order to achieve effective performance, scalability, and availability. By reading this book, you will gain a thorough understanding of how to apply solid Cisco network solution models and recommended design practices to provide viable, stable enterprise internetworking solutions. The book presents concepts and examples that are necessary to design converged enterprise networks. Advanced network infrastructure technologies, such as virtual private networks (VPNs) and other security solutions are also covered. Designing Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Third Edition teaches you the latest development in network design and technologies, including network infrastructure, intelligent network services, and converged network solutions. Specific topics include campus, routing, addressing, WAN services, data center, e-commerce, SAN, security, VPN, and IP multicast design, as well as network management. Chapter-ending review questions illustrate and help solidify the concepts presented in the book. Whether you are preparing for CCDP certification or simply want to gain a better understanding of designing scalable and reliable network architectures, you will benefit from the foundation information presented in this book. Designing Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Third Edition, is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. John Tiso, CCIE No. 5162, CCDP is a Product Manager for Cisco Systems. He holds a B.S. Degree in Computer Science and Mathematics from Adelphi University and a Graduate Citation in Strategic Management from Harvard University. John is a published author, has served as a technical editor for Cisco Press, and has participated as a SME for the CCIE program. Prior to Cisco, he was a senior consultant and architect in the Cisco partner channel. - Learn about the Cisco Enterprise Architecture - Create highly available campus and data center network designs - Develop optimum Layer 3 designs - Examine advanced WAN services design considerations - Evaluate SAN design considerations - Deploy effective e-commerce module designs - Create effective security services and IPsec and SSL VPN designs - Design IP multicast networks - Understand the network management capabilities within Cisco IOS Software This book is in the Foundation Learning Guide Series. These guides are developed together with Cisco(R) as the only authorized, self-paced learning tools that help networking professionals build their understanding of networking concepts and prepare for Cisco certification exams. Category: Cisco Certification Covers: CCDP ARCH 642-874

Book CheckPoint NG VPN 1 Firewall 1

Download or read book CheckPoint NG VPN 1 Firewall 1 written by Syngress and published by Elsevier. This book was released on 2003-05-11 with total page 641 pages. Available in PDF, EPUB and Kindle. Book excerpt: Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security requirements, including simplified security management for increasingly complex environments. Built upon Check Point's Secure Virtual Network (SVN) architecture, the Next Generation User Interface revolutionizes the way security administrators define and manage enterprise security by further integrating management functions into a security dashboard and creating a visual picture of security operations. The Next Generation User Interface delivers unparalleled ease-of-use, improved security and true end-to-end security management. Check Point's revenues have more than doubled in each of the last two years, while capturing over 50% of the VPN market and over 40% of the firewall market according to IDC Research. The explosive growth of the company is further evidenced by over 29,000 IT professionals becoming Check Point Certified so far. This book will be the complimentary to Syngress' best-selling Check Point Next Generation Security Administration, which was a foundation-level guide to installing and configuring Check Point NG. This book will assume that readers have already mastered the basic functions of the product and they now want to master the more advanced security and VPN features of the product. Written by a team of Check Point Certified Instructors (the most prestigious Check Point certification) this book will provide readers with a complete reference book to Check Point NG and advanced case studies that illustrate the most difficult to implement configurations. Although not a Study Guide, this book will cover all of the objectives on Check Point's CCSE Exam. · The reader will learn to design and configure a Virtual Private Network (VPN). · The reader will learn to configure Check Point NG for High Availability (HA), which is the ability of a system to perform its function continuously (without interruption) for a significantly longer period of time than the reliabilities of its individual components would suggest. · The reader will learn to use SeucureUpdate, which allows them to perform simultaneous, secure, enterprise-wide software updates.

Book Layer 2 VPN Architectures

Download or read book Layer 2 VPN Architectures written by Wei Luo and published by . This book was released on 2005 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications Evaluate market drivers for Layer 2 VPNs Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3 Grasp the essentials of Layer 2 LAN and WAN technologies Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching Understand the operation and application of Virtual Private LAN Services (VPLS) Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs. Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastruc-tures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced topics relevant to Layer 2 VPN deployment, such as QoS and scalability. Layer 2 VPN Architectures is your practical guide to understanding, designing, and deploying Layer 2 VPNs. Wei Luo, CCIE No. 13,291, is a technical leader for Cisco Systems. He is the principle designer and developer for Cisco Layer 2 VPN products including AToM and VPLS. Wei actively participates in IETF standarization processes. Carlos Pignataro, CCIE No. 4619, is a senior engineer in the Escalation Team for Cisco Systems. In this role he is responsible for handling difficult and complex escalations, working on critical or stalled software defects, and participating in the new product and development process. Dmitry Bokotey, CCIE No. ISP Dial, Security, and Service Provider. He is a network consulting engineer with the Central Engineering and Metro Ethernet team of Cisco Systems. Anthony Chan, CCIE No. 10,266, is a network consulting engineer for the Cisco System Advanced Services Central Engineering organization. Anthony participates in MPLS and routing technology teams, which provide focused design and proactive support to service provider and enterprise customers. Includes a FREE 45-Day Online Edition This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Book Advanced Intelligent Technologies and Sustainable Society

Download or read book Advanced Intelligent Technologies and Sustainable Society written by Kazumi Nakamatsu and published by Springer Nature. This book was released on with total page 632 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book VPNs Illustrated

    Book Details:
  • Author : Jon C. Snader
  • Publisher : Addison-Wesley Professional
  • Release : 2015-01-09
  • ISBN : 0134171810
  • Pages : 699 pages

Download or read book VPNs Illustrated written by Jon C. Snader and published by Addison-Wesley Professional. This book was released on 2015-01-09 with total page 699 pages. Available in PDF, EPUB and Kindle. Book excerpt: Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." By learning to read and interpret various network traces, such as those produced by tcpdump, readers will be able to better understand and troubleshoot VPN and network behavior. Specific topics covered include: Block and stream symmetric ciphers, such as AES and RC4; and asymmetric ciphers, such as RSA and EIGamal Message authentication codes, including HMACs Tunneling technologies based on gtunnel SSL protocol for building network-to-network VPNs SSH protocols as drop-in replacements for telnet, ftp, and the BSD r-commands Lightweight VPNs, including VTun, CIPE, tinc, and OpenVPN IPsec, including its Authentication Header (AH) protocol, Encapsulating Security Payload (ESP), and IKE (the key management protocol) Packed with details, the text can be used as a handbook describing the functions of the protocols and the message formats that they use. Source code is available for download, and an appendix covers publicly available software that can be used to build tunnels and analyze traffic flow. VPNs Illustrated gives you the knowledge of tunneling and VPN technology you need to understand existing VPN implementations and successfully create your own.

Book VPNs

    Book Details:
  • Author : John Mairs
  • Publisher : Network Professional's Library
  • Release : 2002
  • ISBN :
  • Pages : 514 pages

Download or read book VPNs written by John Mairs and published by Network Professional's Library. This book was released on 2002 with total page 514 pages. Available in PDF, EPUB and Kindle. Book excerpt: Beginners network professionals can learn how to set up a Virtual Private Network in the most secure and cost-effective way. Includes VPN blueprints for one of the fastest growing and secure methods for connecting branch offices.