Practical guide for implementing secure intranets and extranets

Saved in:
Bibliographic Details
Author / Creator:Phaltankar, Kaustubh M.
Imprint:Boston : Artech House, c2000.
Description:xx, 401 p. : ill. ; 24 cm.
Language:English
Series:Artech House telecommunications library
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/4823381
Hidden Bibliographic Details
Other authors / contributors:NetLibrary, Inc.
ISBN:1580532276 (electronic bk.)
Notes:Includes bibliographical references (p. 383-384) and index.
Electronic reproduction. Boulder, Colo. : NetLibrary, 2000. Available via World Wide Web. Access may be limited to NetLibrary affiliated libraries.
Table of Contents:
  • Foreword
  • Preface
  • Intended Audience
  • Book Layout
  • Web Site
  • Acknowledgments
  • Conventions
  • 1. Introduction
  • 1.1. Internet
  • 1.2. Intranet
  • 1.2.1. Traditional Approach
  • 1.2.2. Frame Relay-Based Approach
  • 1.2.3. Internet VPN-Based Approach
  • 1.3. Intranet Components
  • 1.4. Intranet Summary
  • 1.5. Extranet
  • 1.5.1. Advantages of Extranet
  • 1.5.2. Security
  • 1.5.3. Examples of Extranet
  • 1.6. Conclusion
  • 2. Wide Area Network Components
  • 2.1. Asynchronous Dial-Up Connections On-Demand Using the Public Switched Telephone Network
  • 2.2. Dedicated Digital Point-to-Point Serial Connection to an Internet Service Provider
  • 2.2.1. Point-to-Point Protocol
  • 2.2.2. PPP Operation
  • 2.3. Packet-Switched Technologies Like X.25, Frame Relay, ATM, and SMDS
  • 2.3.1. X.25
  • 2.3.2. Frame Relay
  • 2.3.3. Asynchronous Transfer Mode
  • 2.3.4. Switched Multimegabit Data Service
  • 2.4. Integrated Services Digital Network
  • 2.4.1. ISDN Physical Setup
  • 2.4.2. Basic Rate Interface
  • 2.4.3. Primary Rate Interface
  • 2.4.4. Applications of ISDN
  • 2.4.5. Security Features of ISDN
  • 2.4.6. Signaling System Number 7
  • 2.5. WAN Topologies and Resiliency Considerations
  • 2.5.1. WAN Topologies
  • 2.6. Conclusion
  • 3. Local Area Network Components
  • 3.1. Ethernet
  • 3.1.1. Bridges
  • 3.1.2. Routers
  • 3.2. Fast Ethernet (100BaseT)
  • 3.2.1. Ethernet Switch (Layer 2 Switch)
  • 3.2.2. Switch Operation
  • 3.2.3. Virtual LANs
  • 3.2.4. Hot-Standby Routing Protocol
  • 3.3. Gigabit Ethernet
  • 3.4. Fiber Distributed Data Interface
  • 3.4.1. Infrastructure
  • 3.5. ATM in the LAN Environment
  • 3.5.1. LAN Architecture and Operation
  • 3.5.2. Multiprotocol Over ATM
  • 3.6. Token Ring
  • 3.6.1. Token Ring Operation
  • 3.7. Layer 3 Switching
  • 3.8. LAN Routing Protocols
  • 3.8.1. Static
  • 3.8.2. Distance Vector Routing Protocol
  • 3.8.3. Link State Routing Protocol
  • 3.8.4. LAN QOS
  • 3.9. Conclusion
  • 4. Network and Service Management
  • 4.1. Network Management
  • 4.1.1. OSI FCAPS Model
  • 4.1.2. SNMP
  • 4.2. Management Information Base
  • 4.2.1. Structured Management Information
  • 4.3. SNMP Commands
  • 4.3.1. SNMP Product Offerings
  • 4.4. Remote Network Monitoring
  • 4.4.1. RMON-II
  • 4.4.2. RMON Product Offerings
  • 4.5. Service Management
  • 4.6. Conclusion
  • 5. Security Components of Intranets and Extranets
  • 5.1. Security Framework for Intranet and Extranet
  • 5.2. Developing a Security Plan
  • 5.3. Security Tools
  • 5.3.1. Prevention
  • 5.3.2. Detection
  • 5.3.3. Correction
  • 5.4. Data Security
  • 5.4.1. Data Confidentiality
  • 5.4.2. Data Integrity
  • 5.4.3. Data Access Control and Authentication
  • 5.4.4. Authentication
  • 5.5. Firewalls
  • 5.5.1. Origin of Firewalls
  • 5.5.2. What Is the Role of a Firewall in an Intranet or an Extranet?
  • 5.5.3. What Are the Different Types of Firewalls?
  • 5.6. Conclusion
  • 6. Virtual Private Network
  • 6.1. What Is VPN?
  • 6.1.1. LAN-to-LAN VPN for Connecting Various Parts of an Intranet
  • 6.1.2. LAN-to-WAN VPN for Extending an Intranet to External Entities to Form Extranets
  • 6.1.3. Remote-LAN-Dial VPDN for Accessing Intranet and Extranet Applications
  • 6.2. Why VPN?
  • 6.2.1. Lower Cost of Deployment
  • 6.2.2. Data Privacy
  • 6.2.3. Ubiquitous Access
  • 6.2.4. Deployment Flexibility
  • 6.2.5. Implementation Scalability
  • 6.3. VPN Implementation for Intranet and Extranet
  • 6.3.1. Security
  • 6.3.2. Performance
  • 6.3.3. Ease of Management
  • 6.3.4. Conformance to Standards and Interoperability
  • 6.4. Network-to-Network Connection
  • 6.4.1. Data Link Layer
  • 6.4.2. Network Layer
  • 6.4.3. Session Layer
  • 6.4.4. Application Layer VPN Solution
  • 6.4.5. Dial-to-LAN VPDN Connection
  • 6.5. Conclusion
  • 7. Case Studies
  • 7.1. Case Study I: Intranet in a Company Having a Single Office Location
  • 7.1.1. Case Study Objective
  • 7.1.2. Case Study Background and Requirements
  • 7.1.3. Conclusion
  • 7.2. Case Study II: Intranet in a Company Having Multiple Office Locations Spread Over a Wide Geographical Area
  • 7.2.1. Case Study Objective
  • 7.2.2. Cast Study Background and Requirements
  • 7.2.3. Conclusion
  • 7.3. Case Study III: Intranet in a Company With a Legacy X.25 Connection to Its Operations in Europe
  • 7.3.1. Case Study Objective
  • 7.3.2. Case Study Background and Requirements
  • 7.3.3. Conclusion
  • 7.4. Case Study IV: Intranet in a Company With a Legacy Connection to an IBM Mainframe System Using SNA
  • 7.4.1. Case Study Objective
  • 7.4.2. Case Study Background and Requirements
  • 7.4.3. Conclusion
  • 7.5. Case Study V: Intranet Connectivity in a Company Using Internet-Based VPN
  • 7.5.1. Case Study Objective
  • 7.5.2. Case Study Background and Requirements
  • 7.5.3. Conclusion
  • 7.6. Case Study VI: Remote Access to the Intranet Using Internet-Based VPN
  • 7.6.1. Case Study Objective
  • 7.6.2. Case Study Background and Requirements
  • 7.6.3. Conclusion
  • 7.7. Case Study VII: Extranet Access via VPN
  • 7.7.1. Case Study Objective
  • 7.7.2. Case Study Background and Requirements
  • 7.7.3. Conclusion
  • List of Acronyms and Abbreviations
  • Bibliography
  • About the Author
  • Index