Skip to main content
IBM 
ShopSupportDownloads
IBM HomeProductsConsultingIndustriesNewsAbout IBM
IBM : developerWorks : Security : Education - online courses
Virtual private networks, Part 1
Download tutorial zip fileView letter-sized PDF fileView A4-sized PDF fileE-mail this tutorial to a friend
Main menuSection menuGive feedback on this tutorialPreviousNext
6. Wrapup
  


Resources page 2 of 3


  • Karen Monkhouse's overview of VPN technology, "Business Taps the Internet with Virtual Private Networks", includes several case studies.
  • Visit MIT's ISAKMP Distribution Page.
  • RFC 2003, "IP encapsulation within IP", shows you how an IP datagram can be encapsulated within another IP datagram.
  • Check out RFC 2401, "Security Architecture for the Internet Protocol" by Stephen Kent and Randall Atkinson.
  • Winn Schwartau's Network World column tells you what you need to know about VPNs.
  • RSA Security's Web site features the white paper "Implementing A Secure Virtual Private Network".
  • Get the latest IBM security news.
  • Find out how IBM's Managed Security Services can help you to identify and solve your real-time security risks by using a proven continuous management process.

  • Main menuSection menuGive feedback on this tutorialPreviousNext
    PrivacyLegalContact