You are on page 1of 6

STRENGTH IN THE STORM

EKNATH EASWARAN Jaico Publishing House, Mumbai, 2006 Pages 183

Jane Hamilton once wrote It is books that are a


key to the wide world; if you cant do anything else, read all that you can. For people endeavouring to create calm in difficult times , Strength in the Storm provides a key to cope with stress and anxiety by discovering our inner strength to meet everyday challenges and crises. Stress, a six letter word has become the most disturbing symptom of our times; it is a chronic interference that has devastating manifestations. It has multiple causes, ranging from family responsibilities, professional hazards, tense relationships, financial worries to ill-behaved children. The essence of this simple, practical literary creation is to train our mind to learn to: Effectively cope with difficulties of life To stay still and controlled under stressful and confrontational circumstances Practice patience and improve relations Recover from drastically challenging situations What kind of person do we want to be? What kind of world do we want to live in? How do we cope with anxiety without being disturbed? How to lead a balanced life? The book holds answers to all these questions and many more natural queries. From a child to a housewife, from a working professional to a retired person, from a student to an entrepreneur, everyone is striving for self-excellence. To be leaders in our sphere of activity, to bring strength and hope in our days, to keep those whom we live, love and work with happy, the book provides an interesting kaleidoscope of engrossing contents. About The Author The Late Shri Eknath Easwaran was one of the worlds most respected and influential spiritual teacher renowned for his expertise on inspirational and spiritual issues. He was Founder and Director of the Blue Mountain Center of

Meditation which was established late in 1961 and the Nilgiri Press in the United States. Originally hailing from India, as a boy he grew up in a South Indian village and went on to become Professor of English Literature at the University of Nagpur. An established writer and a renowned motivational speaker he had to his credit about two dozen books translated into many languages. His first book Gandhi the Man in 1972 was followed by more impressive books on Passage Meditation and Spiritual Biographies. Some of his jewel creations are, Take your Time, Your life is your message, Conquest of mind, God makes the rivers to flow , Original Goodness, Words to Live By and The Bhagavad Gita for Daily Living. About The Book: The book contains six chapters and each chapter has been interestingly designed and methodically arranged in three distinctive sections. All the three sections are original, comprehensive and absorbing. The first section introduces the Authors inspiring, timeless ideas in light of problems encountered by people in their everyday life. The second section has an introduction by the authors wife Christine Easwaran followed by the main chapter by the author where the key ideas drawn from real life situations are fascinatingly presented to keep ones mind calm and secure during turbulent times. The illustrations cited in this section in the sidebars are attention catching and will remain with the readers for long. Mantram-a tool for calming the mind that one can learn and use at any time is the core focus and the key ideas revolve around it. In the main theme the author refers to his maternal grandmother a couple of times whom he fondly calls Granny and who appears to be his philosopher, guide and inspiration for applying spiritual wisdom in everyday affairs. The concluding section is the workbook section containing a list of Key Ideas, two pages of recommended activities- Points to Practice for the readers to actually experiment and

93

visualize the results and a motivating inspirational passage of poetry that reinforces the central theme of the chapter. The books chief attraction stems from the finesse with which highly relevant issues of stress and everyday challenges of life are handled in an impressively lucid and systematic manner in each chapter. The author calls the first chapter Strength in the Storm. This chapter is the books pulse and commences with inspirational words by the author where he says, Steadiness of mind is one of the most practical of skills. Nothing is more vital than learning to face turmoil with courage, confidence and compassion. Fortunately, we already possess these capacities. But we need a calm mind to draw on them. That is the practical importance of a calm mind. The underlying objective is to motivate the readers to discover the strength of a calm and steady mind to face lifes challenges in an effective way. In todays age of conflict and anxiety, we cannot control life but we can control our responses to lifes challenges by stabilizing our mind with help of mantram or prayer word, is the central idea to which the author draws attention. It has been emphasized that the most important lesson to learn from crisis is to find ones centre of strength within. In Points To Practice the strategies to choose and use a Mantram has been effectively outlined. The chapter concludes on a motivational note Let Nothing Upset You by Saint Teresa of Avila. The next chapter is Be at Peace in the Moment where the author appeals to slow down in life, not to hurry and to enjoy completely the sanctity of the present moment. The author here explains that time does not hurry us, it is, we who hurry ourselves and if we feel we do not have enough time, then the first thing we have to learn is not to waste what time we have. A brain storming expression for all professionals is very well presented by the author when he says- Attention doesnt wander because a job is dull, its the other way around- a job seems dull when we allow our attention to wander.

Never be rushed by circumstances, listen attentively to others, move without hurry and with unshakable concentration this is the motto of this chapter and it sums up with a Gaelic Prayer I Weave a Silence. The third chapter boldly claims, Take the Worry Away. To lead a carefree, joyful, free from worry life the author emphasizes a very simple thought to do only one thing at a time with complete attention and learn to live in the present. With a tinge of humor , Eknath further remarks that if we could learn how to harness worry, there would be no energy crises. Here, in Points to Practice it is suggested that to get rid of unproductive worry; one must maintain a mantram worry book and go for a mantram walk. The chapter concludes with a meaningful piece of composition by Mahmud Shabestari The Mirror of this World. The next chapter suitably titled Nourish Your Mind advises that as we eat good food for a strong and healthy body similarly our mind needs nourishment with healthy thoughts and experiences. To have healthy thoughts we must carefully select what goes into our consciousness. Moreover, to keep away from aggression we must listen with attention and reply with respect. We all are familiar with an old saying You are what you eat. Eknath says, No, Your body is what you eat. You are what you think. The significance of good company in transforming our thinking process is also emphasized with the fact that we automatically absorb the influence of those around us- for better or for worse. If one goes out with ones boyfriend and comes back agitated, then according to the book he is not worthy of being called a boyfriend, he should be aptly addressed as boyfoe. It is our association with positive people that makes us stronger, secure and creative thinkers. The chapter concludes with inspirational words Radiant is the World Soul by Abraham Issac Kook. The following chapter humbly exclaims, Choose Kindness. We have to develop an unupsettable mind by treating others with the

94

same respect and kindness as we want for ourselves. A great medieval mystic, Ruysbroeck, was when asked about the secret of his leading a contented spiritual life, he had calmly replied Be kind, Be kind, Be kind. As unkind words cause lasting wounds one must practice to choose words with honesty, care and kindness even in the face of strong provocation. The chapter sums up with a masterpiece creation of Lord Buddha Twin Verses in which some lines touchingly communicate Our life is shaped by our mind: we become what we think. Joy follows a pure thought like a shadow that never leaves. The last chapter dwells upon the thought Light the Darkness. By practicing and learning ways to calm the mind each individual is capable of becoming an instrument of peace. Any change that we wish to bring around us has to begin with efforts from ourselves as we expand our emotional states- positive or negative to others. We have taken birth to be of help to others and we must strive to accomplish this in our life. The chapter ends with an appropriate prayer by Saint Francis of Assisi-Instrument of Peace. Conclusion: This book successfully conveys that a calm, relaxed mind can weather any storm, downfall or challenge that life brings. External environment calamities are as uncontrollable as the difficulties we face in life passage but what is controllable is our internal response to these extremities. The book is interspersed with motivational anecdotes, inspirational thoughts and soul-stirring prayers signifying the ideas that the author tries to drive home. Key Ideas for renewing and reawakening our inner strengths are clearly presented. Points to Practice encourage readers for experimentation to be abundantly rewarded in peace, calmness and security in troubled times.

The author commences each chapter with a philosophical thought and concludes with a touching prayer adding further weight to the narrative and making it interesting and valuable reading . The creative use of mantaram in difficult situations will certainly influence the audience to apply it and transform their lives for better. The Introduction and Afterword by Christine Easwaran adds on to the memorable and enriching experience. She concludes the afterword with a very touching statement-Keep reminding yourself that goodness is the strongest force in the world. We found the book to the point, easy read and enjoyable. With its powerful, thought provoking contents it compels the reader to have some soul searching and self introspection. Steady and sustained concentration on the Key Ideas drive them deep into our minds and hearts. Points to Practice if followed and practiced well will bring a sea change in ones behavior. The author has successfully attempted to convey that once an individual starts taking control of his emotions and situations by remaining calm the task of converting aggression into compassion, hatred into affection, ill will into good will and uncertainty into security becomes much easier. To live more voluntarily is to live more deliberately, intentionally and purposefully in short, it is to live more consciously. We cannot be deliberate when we are distracted from life. We cannot be intentional when we are not paying attention. We cannot be purposeful when we are not being Present. Inspired by the words of Rues Duane Elgin, we recommend this book for all those who seek to lead a fruitful, purposeful and joyful existence in todays testing times.

95

IPsec Virtual Priv irtu riva IPsec Vir tu al Private Network undamentals: Fundamentals: An Introduction to VPNs
James Henry Carmouche Pearson Education Pages: 460
ISBN: 81 317 0591 9

With the ever increasing incidents of network


security thefts, masquerading and spoofing, Internet users (many of whom are the Top Management Officials of Corporates) are falling prey to the wily hackers who are hell bent on rampaging and destroying, intruding into private domains, stealing and selling or publicizing confidential information. Given the widely known vulnerabilities and/ or security holes in the TCP/IP Protocol Suite, the Internet is not safer any more for even general data transmission. The situation becomes more weary for the companies which have their offices spread across the globe but cannot afford to lay down a dedicated (and privately owned) enterprise internetwork for the purpose of communication and have to rely on the Internet for the same. Internet Protocol Version 4 (IPv4), a network layer protocol (in TCP/IP reference model) has been subjected to very potent security exploits by the hackers. The newer version of IP i.e. IPv6 has , security features for authentication and encryption to remove the existing and possible vulnerabilities. Virtual Private Networks utilize this aspect of IPv6 and provide a means to realize the benefits of existing infrastructure with greatly reduced IT operational expenditures. The author, James Henry Carmouche, has done an exceptional work in introducing the VPN fundamentals with a solid background introduction to cryptography and public key infrastructure. Carmouche is currently working for Cisco Systems Enterprise Systems Engineering Group, North Carolina, where he is responsible for building, validating, and evangelizing new and emerging security integration concepts in new network architectures and solution reference designs. Prior to joining ESE, he served as a technical marketing engineer in Ciscos Government Systems Unit (GSU), where he is responsible for bringing advanced security products to market, building technical marketing collateral and presentations, and designing new product introduction training for the GSUs newly introduced security platforms.

The book title under review, IPsec Virtual Private Network Fundamentals: An Introduction to VPNs, provides a holistic account on IPSec, VPN, deployment, and advanced topics like PKI and dynamic peers. The text is presented in a concept with detailed and self explanatory diagrams. Throughout the book, the author has referred a variety of CiscoTM products for effective and efficient deployment of VPN. The book is divided into three parts, namely, Introductory Concepts and Configuration/ Troubleshooting, Designing VPN Architectures and Advanced Topics. Part I is devoted to the understanding of the fundamentals of IPSec, configuration and troubleshooting of IPSec VPNs. Part II takes the reader through designs of VPN architectures for High Availability in local IPSec VPN to Remote Access VPN. Part III gives user an insight to some advanced topics like PKI and handling dynamically addressed peers. Chapter 1 (Introduction to VPN Technologies), introduces the VPN technologies like L2F (Layer 2 Forwarding Protocol), PPTP (Point to Point Tunnelling Protocol) and L2TP (Layer 2 Tunnelling Protocols, MPLs VPNs (Multiprotocol Label Switching VPNs) and IPSec VPNs. The author discusses how todays VPN technologies enable enterprise work forces to share data seamlessly and securely over common yet separately maintained network infrastructures such as through an internet service provider (ISP) between enterprise networks or with corporate extranet partners. The chapter concludes with a gentle and brief discussion on IPSec VPNs and the Cisco Security Framework. Chapter 2 (IPsec Fundamentals) can be best understood as a well knit overview of cryptographic components, IPSec operation and Internent Key Exchange (IKE) & Internet Security Association and Key Management Protocol (ISAKMP) operations, elucidating symmetric and asymmetric encryption, message authentication and integrity and sender nonrepudiation mechanisms, Carmouche has very intuitively and visually explained IPSec fundamentals like Modes (Tunnel and Transport), Transforms, IKE Negotiation and ISAKMP Configuration (applying Crypto Maps to appropriate crypto interfaces).

96

Chapter 3 (Basic IPSec VPN Technologies and Configuration) discusses several common deployments of IPSec Virtual Private Networks starting with the site to - site IPSec model over a dedicated circuit between two endpoints, aggregation to many site to site IPSec VPNs at an aggregation Point is discussed. This discussion is further extended to Remote Access VPN (RAVPN) design considerations. The chapter finishes with introduction to common Demilitarized Zone (DMZ) designs with Various IPSec concentrator, description of a concentrator and placement alternatives. Chapter 4 (Common IPSec VPn Issues) begins with a brief overview of common tools available in Ciscos IOS (Internetworking Operating System), used to diagnose and correct issues with IPSec VPN Deployments, like show and debug. The common configuration issues with IPSec VPNs which arise when one or more IPSec Gateways are configured incorrectly, are IKE SA Proposal Mismatches, IKE Authentication Failures and Errors, IPSec SA Proposal Mismatches and Crypto Protected Address Space Issues (Crypto ACL Issues). The Architectural and Design issues involve troubleshooting challenges faced by IPSec VPN implementations which arise because there is a variety of network elements that can interfere with optimal operation of an IPSec VPN (i.e. incompatibilities between IPSec and other network technologies) if it is not managed correctly. Troubleshooting entails diagnosis of the problem (that can result from improper design) and appropriate solutions to those problems. Major troubleshooting challenges faced are IPSec VPNs in firewalled environments, NAT issued in IPSec VPN designs, IPSec and Quality of Service (QoS), Fragmentation issues in IPSec VPNs and effort of Recursive Routing on IPSec VPNs. Chapter 5 (Designing for High Availability) introspects the magic areas for designing High Availability (HA) into IPSec VPN system architecture. Network Path Redundancy, IPSec Tunnel Termination Redundancy, Managing Path Availability, Managing Path Symmetry and Load Balancing . The author has comprehensively summarized the HA design in a table at the end of the summary of the chapter.

Chapter 6 (Solutions for Local Site to Site High Availability) is about local IPSec HA . After discussing its several key components that comprise a highly available IPSec VPN design, the chapter concludes with a comparison of HA design techniques on the basis of cost, availability, overhead, reconvergence delay etc. Chapter 7 (Solution for Geographic Site to Site High Availability) widens the scope of IPSec VPN High Availability (HA) to incorporate design principles specific to geographic IPSec VPN HA. Three most pertinent design options (each reinforced with a casestudy) are discussed in the chapter: Multiple Peer Statements in Routing Protocols & Reverse Route Injection, Encrypted Routing Protocols using IPSec and Generic Routing Encapsulation (GRE), & Peer Management with Dynamic Multipoint VPN (DMVPN). Chapter 8 (Handling Vendor Interoperability with High Availability) is all about developing a highly available design of IPSec VPN in a multivendor deployment. The chapter introduces various barriers to HA design presented by multivendor interoperability and their impacts like inability of specify multiple peers, limited routing protocol support on certain platforms, lack of Reverse Route Injection (RRI) & Generic Routing Encapsulation (GRE) support, etc. Solutions to all these barriers have then been provided by the author through proper selection of options that exist within IPSec itself. Chapter 9 (Solutions to Remote Access VPN High Availability) explores the IPSec High Availability in Remote Access Virtual Private Networks (RAVPNs) deployments. RAVPNs refer to topologies in which remote users establish a secure tunnel from a remote location using either a piece of client software on their laptop or a small hardware based client at a home office or other small remote location. IPSec based RAVPNs are composed of two key components: a VPN client and a VPN concentrator. In IPSec VPN, the need of high availability is specific to the client in an RAVPN implementation. Chapter 10 (Further Architectural Options for IPSec) drills in to the causative factors of variations

97

in the fundamentals of IPSec VPN design. The variations can be addressed through strategies like IPSec VPN Termination On a stick (on a stick describes a scenario in which the device performing that technical function is attached tot eh network using a single interface), In Path versus Out of - path Encryption, and Separate Termination of IPSec and GRE (FRE offload). Every strategy has been elucidated through a case study. Chapter 11 (Public Key Infrastructure and IPSec VPNs) explains the role of Public Key Infrastructure (PKI) in an enterprise IPSec VPN. PKI is a cryptographic system that uses an infrastructure of trusted resources, such as Certificate Authorities (CAs) and Registration Authorities (Ras), to facilitate cryptographic transaction in a trusted manner. In enterprise IPSec VPN, key management can be overwhelming (which may be scaled up depending on the requirements). Here PKI can be used. The chapter introduces PKI at an elementary level first and then explains where does PKI fit in the IPSec model. The subject matter

is further strengthened through a few casestudies and sample configurations. Chapter 12 (Solutions to Handling Dynamically Addressed Peers) examines the role of Dynamic Crypto Maps in IPSec VPN. Due to increasing mobility of the work forces a need to gain secure network access from varying physical locations. Dynamic peers allow this and therefore have become popular. Dynamic Crypto Maps are pivotal to the support of dynamically addressed peers, since no manual specification of a peer within the dynamic crypto map configuration is required. A number of important books and relevant RFCs (Request for Comments) have been provided as an appendix for supplementary reading and reference. This book provides the reader with a basic understanding of IPSec VPN operations and its different components as well as implementations in diverse network environments. A must for Network Professionals working on Cisco Routers.

98

You might also like