Practical guide for implementing secure intranets and extranets
Saved in:
Author / Creator: | Phaltankar, Kaustubh M. |
---|---|
Imprint: | Boston : Artech House, c2000. |
Description: | xx, 401 p. : ill. ; 24 cm. |
Language: | English |
Series: | Artech House telecommunications library |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/4823381 |
Table of Contents:
- Foreword
- Preface
- Intended Audience
- Book Layout
- Web Site
- Acknowledgments
- Conventions
- 1. Introduction
- 1.1. Internet
- 1.2. Intranet
- 1.2.1. Traditional Approach
- 1.2.2. Frame Relay-Based Approach
- 1.2.3. Internet VPN-Based Approach
- 1.3. Intranet Components
- 1.4. Intranet Summary
- 1.5. Extranet
- 1.5.1. Advantages of Extranet
- 1.5.2. Security
- 1.5.3. Examples of Extranet
- 1.6. Conclusion
- 2. Wide Area Network Components
- 2.1. Asynchronous Dial-Up Connections On-Demand Using the Public Switched Telephone Network
- 2.2. Dedicated Digital Point-to-Point Serial Connection to an Internet Service Provider
- 2.2.1. Point-to-Point Protocol
- 2.2.2. PPP Operation
- 2.3. Packet-Switched Technologies Like X.25, Frame Relay, ATM, and SMDS
- 2.3.1. X.25
- 2.3.2. Frame Relay
- 2.3.3. Asynchronous Transfer Mode
- 2.3.4. Switched Multimegabit Data Service
- 2.4. Integrated Services Digital Network
- 2.4.1. ISDN Physical Setup
- 2.4.2. Basic Rate Interface
- 2.4.3. Primary Rate Interface
- 2.4.4. Applications of ISDN
- 2.4.5. Security Features of ISDN
- 2.4.6. Signaling System Number 7
- 2.5. WAN Topologies and Resiliency Considerations
- 2.5.1. WAN Topologies
- 2.6. Conclusion
- 3. Local Area Network Components
- 3.1. Ethernet
- 3.1.1. Bridges
- 3.1.2. Routers
- 3.2. Fast Ethernet (100BaseT)
- 3.2.1. Ethernet Switch (Layer 2 Switch)
- 3.2.2. Switch Operation
- 3.2.3. Virtual LANs
- 3.2.4. Hot-Standby Routing Protocol
- 3.3. Gigabit Ethernet
- 3.4. Fiber Distributed Data Interface
- 3.4.1. Infrastructure
- 3.5. ATM in the LAN Environment
- 3.5.1. LAN Architecture and Operation
- 3.5.2. Multiprotocol Over ATM
- 3.6. Token Ring
- 3.6.1. Token Ring Operation
- 3.7. Layer 3 Switching
- 3.8. LAN Routing Protocols
- 3.8.1. Static
- 3.8.2. Distance Vector Routing Protocol
- 3.8.3. Link State Routing Protocol
- 3.8.4. LAN QOS
- 3.9. Conclusion
- 4. Network and Service Management
- 4.1. Network Management
- 4.1.1. OSI FCAPS Model
- 4.1.2. SNMP
- 4.2. Management Information Base
- 4.2.1. Structured Management Information
- 4.3. SNMP Commands
- 4.3.1. SNMP Product Offerings
- 4.4. Remote Network Monitoring
- 4.4.1. RMON-II
- 4.4.2. RMON Product Offerings
- 4.5. Service Management
- 4.6. Conclusion
- 5. Security Components of Intranets and Extranets
- 5.1. Security Framework for Intranet and Extranet
- 5.2. Developing a Security Plan
- 5.3. Security Tools
- 5.3.1. Prevention
- 5.3.2. Detection
- 5.3.3. Correction
- 5.4. Data Security
- 5.4.1. Data Confidentiality
- 5.4.2. Data Integrity
- 5.4.3. Data Access Control and Authentication
- 5.4.4. Authentication
- 5.5. Firewalls
- 5.5.1. Origin of Firewalls
- 5.5.2. What Is the Role of a Firewall in an Intranet or an Extranet?
- 5.5.3. What Are the Different Types of Firewalls?
- 5.6. Conclusion
- 6. Virtual Private Network
- 6.1. What Is VPN?
- 6.1.1. LAN-to-LAN VPN for Connecting Various Parts of an Intranet
- 6.1.2. LAN-to-WAN VPN for Extending an Intranet to External Entities to Form Extranets
- 6.1.3. Remote-LAN-Dial VPDN for Accessing Intranet and Extranet Applications
- 6.2. Why VPN?
- 6.2.1. Lower Cost of Deployment
- 6.2.2. Data Privacy
- 6.2.3. Ubiquitous Access
- 6.2.4. Deployment Flexibility
- 6.2.5. Implementation Scalability
- 6.3. VPN Implementation for Intranet and Extranet
- 6.3.1. Security
- 6.3.2. Performance
- 6.3.3. Ease of Management
- 6.3.4. Conformance to Standards and Interoperability
- 6.4. Network-to-Network Connection
- 6.4.1. Data Link Layer
- 6.4.2. Network Layer
- 6.4.3. Session Layer
- 6.4.4. Application Layer VPN Solution
- 6.4.5. Dial-to-LAN VPDN Connection
- 6.5. Conclusion
- 7. Case Studies
- 7.1. Case Study I: Intranet in a Company Having a Single Office Location
- 7.1.1. Case Study Objective
- 7.1.2. Case Study Background and Requirements
- 7.1.3. Conclusion
- 7.2. Case Study II: Intranet in a Company Having Multiple Office Locations Spread Over a Wide Geographical Area
- 7.2.1. Case Study Objective
- 7.2.2. Cast Study Background and Requirements
- 7.2.3. Conclusion
- 7.3. Case Study III: Intranet in a Company With a Legacy X.25 Connection to Its Operations in Europe
- 7.3.1. Case Study Objective
- 7.3.2. Case Study Background and Requirements
- 7.3.3. Conclusion
- 7.4. Case Study IV: Intranet in a Company With a Legacy Connection to an IBM Mainframe System Using SNA
- 7.4.1. Case Study Objective
- 7.4.2. Case Study Background and Requirements
- 7.4.3. Conclusion
- 7.5. Case Study V: Intranet Connectivity in a Company Using Internet-Based VPN
- 7.5.1. Case Study Objective
- 7.5.2. Case Study Background and Requirements
- 7.5.3. Conclusion
- 7.6. Case Study VI: Remote Access to the Intranet Using Internet-Based VPN
- 7.6.1. Case Study Objective
- 7.6.2. Case Study Background and Requirements
- 7.6.3. Conclusion
- 7.7. Case Study VII: Extranet Access via VPN
- 7.7.1. Case Study Objective
- 7.7.2. Case Study Background and Requirements
- 7.7.3. Conclusion
- List of Acronyms and Abbreviations
- Bibliography
- About the Author
- Index