Skip to main content
IBM 
ShopSupportDownloads
IBM HomeProductsConsultingIndustriesNewsAbout IBM
IBM : developerWorks : Security : Education - online courses
Virtual private networks, Part 2
Download tutorial zip fileView letter-sized PDF fileView A4-sized PDF fileE-mail this tutorial to a friend
Main menuSection menuGive feedback on this tutorialPreviousNext
6. Wrapup
  


Resources page 2 of 3


  • Karen Monkhouse's overview of VPN technology, "Business Taps the Internet with Virtual Private Networks", includes several case studies.
  • Visit MIT's ISAKMP Distribution Page.
  • RFC 2003, "IP encapsulation within IP", shows you how an IP datagram can be encapsulated within another IP datagram.
  • Check out RFC 2401, "Security Architecture for the Internet Protocol" by Stephen Kent and Randall Atkinson.
  • Winn Schwartau's Network World column tells you what you need to know about VPNs.
  • RSA Security's Web site features the white paper "Implementing A Secure Virtual Private Network".
  • Get the latest IBM security news.
  • Find out how IBM's Managed Security Services can help you to identify and solve your real-time security risks by using a proven continuous management process.
  • ICSA Labs (http://www.icsalabs.com/), a division of the TruSecure Corp., is a central authority for research, intelligence, and product certification for the security industry.
  • For more on AIX, IBM's scalable UNIX platform, check out http://www-1.ibm.com/servers/aix/.
  • Linux FreeS/WAN is an implementation of IPSEC and IKE for Linux. To find out more, head for http://www.freeswan.org/.

  • Main menuSection menuGive feedback on this tutorialPreviousNext
    PrivacyLegalContact