| |
Karen Monkhouse's overview of VPN technology,
"Business
Taps the Internet with Virtual Private Networks", includes
several case studies.Visit MIT's ISAKMP
Distribution Page.RFC 2003,
"IP
encapsulation within IP", shows you how an IP datagram can
be encapsulated within another IP datagram.Check out RFC 2401, "Security Architecture for the Internet
Protocol" by
Stephen Kent and Randall Atkinson.Winn
Schwartau's Network World column tells you what you need to know
about VPNs.RSA Security's Web site features the white paper
"Implementing A
Secure Virtual Private Network". Get the latest
IBM security news.Find out how
IBM's Managed Security Services can help you to identify and
solve your real-time security risks by using a proven continuous
management process.
|