|
|
|
![]() |
![]() |
![]() |
![]() |
IBM : developerWorks : Security : Education - online courses![]() | ![]() ![]() ![]() ![]() |
![]() |
![]() | |||||
![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
![]() | ||||
This tutorial is aimed at technical folks who want to understand the overall workings of a virtual private network or VPN. It is a survey of the VPN field, not an in-depth analysis. However, knowledge of basic networking concepts is recommended. Part 1 started with a high-level VPN overview, proceeded to the technologies involved, and delved into the IPSec protocol; here in Part 2, we'll take a closer look at this technology and examine some VPN implementations of note. |
![]() | ![]() | ![]() | ![]() | ![]() | ![]() |
![]() |
|
|