July 2006
Intermediate to advanced
408 pages
9h 21m
English
This chapter brings together the technologies introduced in Chapter 4, “A Virtualization Technologies Primer: Theory,” in several architectures to deliver virtual private network (VPN) functionality. This chapter examines how you can use alternative protocols for the different architectures and explains the ratio of scalability and complexity of the different solutions. In other words, if Chapter 4 is about ingredients, this chapter lists recipes. We are still in the realm of theory because we are not ready to look at how different architectures best fit real-world scenarios. We do that starting in Chapter 6, “Infrastructure Segmentation Architectures: Practice.” This section is a necessary ...
Read now
Unlock full access