tailieunhanh - SSL REMOTE ACCESS VPNs
This book provides a complete guide to the SSL VPN technology and discusses its implementation on Cisco SSL VPN–capable devices. Design guidance is provided to assist you in implementing SSL VPNs in an existing network infrastructure. This includes examining existing hardware and software to determine whether they are SSL VPN capable, providing design recommendations, and guiding you on setting up the Cisco SSL VPN devices. Toward the end of Chapters 5 and 6, common deployment scenarios are covered to assist you in deploying an SSL VPN in your network. | . CISCO t SECURITY - SSL Remote Access VPNs An introduction to designing and configuring SSL virtual private networks Jazib Frahim. CCIE No. 5459 Qiang Huang. CCIE No. 4937 SSL Remote Access VPNs Jazib Frahim CCIE No. 5459 Qiang Huang CCIE No. 4937 Cisco Press Cisco Press 800 East 96th Street Indianapolis IN 46240 USA ii SSL Remote Access VPNs Jazib Frahim Qiang Huang Copyright 2008 Cisco Systems Inc. Published by Cisco Press 800 East 96th Street Indianapolis IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means electronic or mechanical including photocopying recording or by any information storage and retrieval system without written permission from the publisher except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing June 2008 Library of Congress Catalog Card Number 2005923483 ISBN-13 978-1-58705-242-2 ISBN-10 1-58705-242-3 Warning and Disclaimer This book is designed to provide information about the Secure Socket Layer SSL Virtual Private Network VPN technology on Cisco products. Every effort has been made to make this book as complete and as accurate as possible but no warranty or fitness is implied. The information is provided on an as is basis. The authors Cisco Press and Cisco Systems Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems Inc. Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Cisco Press or Cisco Systems Inc. cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of
đang nạp các trang xem trước