IP UDP TCP ICMP NAT and Private IP Addresses PPP IPv6 Routing Summary Exercises Introduction Layering Encapsulation Addressing
NCP SECURE ENTRY CLIENT TUNNEL TEMPORARILY BROKEN CODE
Purpose Readers Typographical Conventions Source Code and Third-Par ty Programs Testbed Road Map Summary To Rich Stevens, who showed me the way, and to Maria, who makes it all possible. Rights and Contracts Department One Lake Street Upper Saddle River, NJ 07458 ISBN 4-X Text printed in the United States on recycled paper at R.R. For information regarding permissions, write to: Pearson Education, Inc. This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. Includes bibliographical references and index. Corporate and Government Sales (800) 382-3419 For sales outside the U.S., please contact: International Sales Visit us on the Web: Library of Congress Cataloging-in-Publication Data Snader, Jon C., 1944– VPNs illustrated : tunnels, VPNs, and IPsec / Jon C. For more information, please contact: U.S. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals.
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. VPNs Illustrated Tunnels, VPNs, and IPsec Jon C.
1.3 Typographical Conventions.Ģ.9 NAT and Private IP Addresses.ģ.4 Cryptographic Hash Functions, MACs, and HMACs.ġ0.5 Combining Security Associations.ġ3.4 An Example Negotiation.ī.2 tcpdump and Other Packet Sniffers.