Virtual Private Networking

Microsoft® Windows® 2000 includes extensive support for virtual private networking technology, which leverages the IP connectivity of the Internet to connect remote clients and remote offices. As a network professional, you should understand the important uses of virtual private networking for your organization and the underlying technologies that make it work: Point-to-Point Tunneling Protocol (PPTP), Layer Two Tunneling Protocol (L2TP), virtual private networks and security, virtual private networks and routing and translation, virtual private networks and firewalls, and the troubleshooting of virtual private network connections. You should already be familiar with TCP/IP, IP routing, IP Security (IPSec), and the Windows 2000 remote access server.

In This Chapter

Virtual Private Networking Overview

Point-to-Point Tunneling Protocol

Layer Two Tunneling Protocol and Internet Protocol Security

VPN Security

Addressing and Routing for VPNs

VPNs and Firewalls

VPNs and Network Address Translators

Pass-Through VPN Scenario

Troubleshooting VPNs

  • For more information about TCP/IP, see "Introduction to TCP/IP" in the Microsoft ® Windows ®  2000 Server Resource Kit TCP/IP Core Networking Guide .

  • For more information about IPSec, see "Internet Protocol Security" in the TCP/IP Core Networking Guide .

  • For more information about unicast IP routing, see "Unicast IP Routing" in this book.

  • For more information about demand-dial routing, see "Demand-Dial Routing" in this book.

  • For more information about the Windows 2000 remote access server, see "Remote Access Server" in this book.