`Your PM Me New 'ur/e.
`
`Networks
`
`O’REILLY®
`
`(.‘lmrlic Syn/I. l’au/ “bl/O G Ali/av lz'ru‘m
`
`
`
`Petitioner Apple Inc. - Exhibit 1054, p. 1
`
`Petitioner Apple Inc. - Exhibit 1054, p. 1
`
`
`
`Wrtul Flint! mm, W Edmon
`by Charlie Scott. Paul Wolfe. and Mike Erwin
`
`Copyright 0 1999, 1998 O'Reilly & Associates. inc. All rights reserved.
`Printed in the United States of America.
`
`Published by O’Reilly & Associates. Inc. 101 Morris Street, Sebastopol. CA 95472.
`
`Elm": Andy Oram
`
`MUCH” Editor: Jane Ellin
`
`Printing History:
`
`March 1998:
`
`First Edition.
`
`January 1999:
`
`Second Edition.
`
`Nutshell Handbook. the Nutshell Handbook logo. and the O'Reilly logo are registered
`trademarks of O'Reilly 8: Associates, lnc. Many of the designations used by manufacturers
`and sellers to distinguish their products are claimed as trademarks. Where those designations
`appear in this book. and O’Reilly & Associates, Inc. was aware of a trademark claim. the
`designations have been printed in caps or initial caps.
`
`The association between the image of puffins and the topic of virtual private networks is a
`trademark of O'Reilly & Associates, Inc.
`
`While every precaution has been taken in the preparation of this book, the publisher assumes
`no responsibility for errors or omissions. or for damages resulting from the use of the
`information contained herein.
`
`<23;
`
`This book is printed on acid-free paper with 85% recycled content, 15% post-consumer waste.
`O'Reiily & Associates is committed to using paper with the highest recycled content available
`consistent with high quality.
`
`ISBN: 1-56592-529-7
`
`[6/99]
`
`Petitioner Apple Inc. - Exhibit 1054, p. 2
`
`Petitioner Apple Inc. - Exhibit 1054, p. 2
`
`
`
`I53
`
`title
`
`if
`
`elm La
`
`sweetness
`
`IEP Item hem Sultan
`[entrant PFTF}
`
`{FFTP—Emhlfl]
`
`Q»
`
`HAS Elmi-
`
`Figure es. Cennectmg re a corporate Meters-er set: an HP the: duesrr’t‘ supper: PPIF
`
`Were PH? Fits frtte flur Scenario
`
`In Figure 4—3 we have a representsdnn eat a temperate effice netwnrit with a T1
`cennectien ten the Internet. The neuter that connects to the Internet is alscl a
`
`packet‘fiitratien firewall. User Sara M. wants te- check her carp-Grate email, and is
`
`dialing tutu her ISP. which is using a PPTP-enabied remete access switd‘t. After
`
`she centre-sis to the sit-itch, it starts a PPTP ea1l ten the RAE server specified in her
`user profile. In this figure, a lightly shaded line extends the PPTP sessic-n back ten
`the client. rather than just to the remnte access switch. Scars uses this line when
`
`she has ta dis] inte- an ISP that dsesn't Euppurt PPTP. and initiates the PPTP ses-
`sien err her weri-tstatiun with a secend RAE call.
`
`Petitioner Apple Inc. - Exhibit 1054, p. 3
`
`Petitioner Apple Inc. - Exhibit 1054, p. 3
`
`
`
`Haw PH? Warts
`
`6.9
`
`:anfiflHPdaasn'L
`.
`summit):
`
`_____________________..._...___,...._,....
`
`Barnum: LAH
`
`Figure 4—3. .1qu diagram {fa PPTP mnnecflan mm" the Interns-1'
`
`On the came-me muter and firewall, the TCPIIF purl an which PP'I'P creates a
`Wicket {1?21} must. be upen m bum inbflund and uutbflund Haffic. 1f the rest (if
`
`the aerial-furl: is Firm-acted by a firewall that disafluws inbnund and nudmund Inter-
`net traffic, than 2 mg]: paint flf Emu-3.? In the LAN is establishedr which is pm-
`tected by me user-band auflmntitafifln.
`
`Petitioner Apple Inc. - Exhibit 1054, p. 4
`
`Petitioner Apple Inc. - Exhibit 1054, p. 4
`
`