This IBM Redbooks publication describes how to implement virtual private networks (VPNs) based on authentication and encryption as defined in the IP Security Architecture (IPSec) standard and draft documents.
This book will help readers to identify the benefits of VPNs in general and the IBM eNetwork VPN solutions in
particular, and then to successfully deploy VPNs.
The most commonly used encryption algorithms and handshaking protocols are explained as a general introduction to IP security.
Scenarios describe how to set up IP tunnelling via existing IP networks and the Internet to effectively implement secure and private conversations over public networks. The scenarios are based on the latest available IBM server, client, firewall and router technologies to illustrate point-to-point (client-to-server, server-to-server or client-to-client), branch office (LAN-LAN) and remote user (client-LAN) environments.
An outlook is provided on further development in this area, including certificate and key management frameworks
such as Internet Key Exchange (IKE), formerly referred to as ISAKMP/Oakley.
Table of contents
Others who downloaded this publication also downloaded