ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Networking / Network Protocols

Mastering OpenVPN

| £33.32 | €37.47 | Ca$54.06 | Au$53.35
by Crist Eric F & Keijser Jan Just
What is this?DRM-EPUB | by download   add to wish list
Mastering OpenVPN by Crist Eric F & Keijser Jan Just

Master building and integrating secure private networks using OpenVPN About This Book • Discover how to configure and set up a secure OpenVPN • Enhance user experience by using multiple authentication methods • Delve into better reporting, monitoring, logging, and control with OpenVPN Who This Book Is For If you are familiar with TCP/IP networking and general system administration, then this book is ideal for you. Some knowledge and understanding of core elements and applications related to Virtual Private Networking is assumed. What You Will Learn • Identify different VPN protocols (IPSec, PPTP, OpenVPN) • Build your own PKI and manage certificates • Deploy your VPN on various devices like PCs, mobile phones, tablets, and more • Differentiate between the routed and bridged network • Enhance your VPN with monitoring and logging • Authenticate against third-party databases like LDAP or the Unix password file • Troubleshoot an OpenVPN setup that is not performing correctly In Detail Security on the internet is increasingly vital to both businesses and individuals. Encrypting network traffic using Virtual Private Networks is one method to enhance security. The internet, corporate, and "free internet" networks grow more hostile every day. OpenVPN, the most widely used open source VPN package, allows you to create a secure network across these systems, keeping your private data secure. The main advantage of using OpenVPN is its portability, which allows it to be embedded into several systems. This book is an advanced guide that will help you build secure Virtual Private Networks using OpenVPN. You will begin your journey with an exploration of OpenVPN, while discussing its modes of operation, its clients, its secret keys, and their format types. You will explore PKI: its setting up and working, PAM authentication, and MTU troubleshooting. Next, client-server mode is discussed, the most commonly used deployment model, and you will learn about the two modes of operation using "tun" and "tap" devices. The book then progresses to more advanced concepts, such as deployment scenarios in tun devices which will include integration with back-end authentication, and securing your OpenVPN server using iptables, scripting, plugins, and using OpenVPN on mobile devices and networks. Finally, you will discover the strengths and weaknesses of the current OpenVPN implementation, understand the future directions of OpenVPN, and delve into the troubleshooting techniques for OpenVPN. By the end of the book, you will be able to build secure private networks across the internet and hostile networks with confidence. Style and approach An easy-to-follow yet comprehensive guide to building secure Virtual Private Networks using OpenVPN. A progressively complex VPN design is developed with the help of examples. More advanced topics are covered in each chapter, with subjects grouped according to their complexity, as we

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 769114

Ebook Details
Pages: 364
Size: 10.9 MB
Publisher: Packt Publishing
Date published:   2015
ISBN: 2370006799535 (DRM-EPUB)

DRM Settings
Copying:not allowed
Printing:not allowed
Read Aloud:  not allowed

This product is listed in the following categories:

Nonfiction > Computers > Networking
Nonfiction > Computers > Networking > Network Protocols

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

© 2016