Skip to main content
IBM 
ShopSupportDownloads
IBM HomeProductsConsultingIndustriesNewsAbout IBM
IBM : developerWorks : Security : Education - online courses
Virtual private networks, Part 2
Download tutorial zip fileView letter-sized PDF fileView A4-sized PDF fileE-mail this tutorial to a friend
Main menuSection menuGive feedback on this tutorialNext
6. Wrapup
  


Summary page 1 of 3


A VPN can be an implementation problem due to the interactions possible over a heterogeneous network. Authentication via IPSec is currently limited to shared secrets or RSA signatures, but in the future it will need to migrate to a workable PKI certificate system.

Many commercial VPN solutions exist, as well as open source implementations. The lack of support and documentation for the open source efforts might limit their usefulness in mission-critical systems, but might not affect systems that have small numbers of users and defined hardware.


Main menuSection menuGive feedback on this tutorialNext
PrivacyLegalContact