VPNs Illustrated
Table of Contents

Preface

Part 1: Background


Introduction
 
1.1  Purpose
1.2  Readers
1.3  Typographical Conventions
1.4  Source Code and Third-Party Programs
1.5  Testbed
1.6  Road Map
1.7  Summary

TCP/IP Overview
 
2.1  Introduction
2.2  Layering
2.3  Encapsulation
2.4  Addressing
2.5  IP
2.6  UDP
2.7  TCP
2.8  ICMP
2.9  NAT and Private IP Addresses
2.10  PPP
2.11  IPv6
2.12  Routing
2.13  Summary

Cryptography Overview
 
3.1  Introduction
3.2  Symmetric Ciphers
3.3  Asymmetric Ciphers
3.4  Cryptographic Hash Functions, MACs, and HMACs
3.5  Digital Signatures
3.6  Certificates
3.7  Summary

Tunnels
 
4.1  Introduction
4.2  IP-in-IP Tunnels
4.3  PPPoE
4.4  GRE
4.5  PPTP
4.6  L2TP
4.7  MPLS
4.8  gtunnel
4.9  Summary

Part 2: Tunnels and VPNs


Virtual Private Networks
 
5.1  Introduction
5.2  PPTP
5.3  L2TP
5.4  Other VPNs
5.5  Summary

Secure Sockets Layer
 
6.1  Introduction
6.2  Cipher Suites
6.3  The SSL Protocol
6.4  SSL on the Wire
6.5  OpenSSL
6.6  The stunnel Program
6.7  SSL Security
6.8  Summary

SSH
 
7.1  Introduction
7.2  The SSHv1 Protocol
7.3  The SSHv2 Protocol
7.4  Building VPNs with SSH
7.5  Summary

Lightweight VPNs
 
8.1  Introduction
8.2  VTun
8.3  CIPE
8.4  Tinc
8.5  OpenVPN
8.6  Summary

Part 3: IPSec


IPsec
 
9.1  Introduction
9.2  An Overview of IPsec
9.3  Road Map for Part 3
9.4  Summary

IPsec Architecture
 
10.1  Introduction
10.2  Protocols
10.3  IPsec Modes
10.4  Security Associations
10.5  Combining Security Associations
10.6  Policies
10.7  IPsec Processing
10.8  Summary

AH
 
11.1  Introduction
11.2  The AH Header
11.3  Sequence Numbers
11.4  AH Processing
11.5  Transport Mode
11.6  Tunnel Mode
11.7  AH with IPv6
11.8  Summary

ESP
 
12.1  Introduction
12.2  The ESP Header
12.3  ESP Processing
12.4  Transport Mode
12.5  Tunnel Mode
12.6  ESP with IPv6
12.7  Summary

IKE
 
13.1  Introduction
13.2  ISAKMP
13.3  IKE
13.4  An Example Negotiation
13.5  Summary

IPsec Futures
 
14.1  Introduction
14.2  IPsec Architecture
14.3  AH
14.4  ESP
14.5  IKE
14.6  NAT Traversal
14.7  Summary

Source Code
 
A.1  Introduction
A.2  Cryptographic Routines
A.3  Library Code

Miscellaneous Software
 
B.1  Netcat
B.2  tcpdump and Other Packet Sniffers
B.3  ssldump
B.4  PPP

Bibliography

Index

Valid HTML 4.0!