Skip to main content
IBM 
ShopSupportDownloads
IBM HomeProductsConsultingIndustriesNewsAbout IBM
IBM : developerWorks : Security : Education - online courses
Virtual private networks, Part 2
Download tutorial zip fileView letter-sized PDF fileView A4-sized PDF fileE-mail this tutorial to a friend
Main menuSection menuGive feedback on this tutorialPrevious
Next Section
2. Authentication Header (AH) considerations
  


IPv6 tunnel considerations page 3 of 3


In IPv6, AH is considered an end-to-end payload and it appears after hop-by-hop, routing, and fragmentation extension headers. The destination options extension header(s) could appear either before or after the AH header.

In Figure 3, the extension headers marked with an asterisk have variable positions, if they are present.

Figure 3
Extension headers marked with asterisk have variable positions


Next Section
Main menuSection menuGive feedback on this tutorialPrevious
PrivacyLegalContact