Use of IPSEC in Linux when configuring network-to-network and point-to-point VPN connections
This article takes a detailed look at the design principles, the basis for deploying VPN, and the IPSEC protocol concept, providing a description of the general features of IPSEC and of the mechanisms required for its implementation. This article was specially selected for translation by developerWorks Russia as an example of developerWorks world-wide offerings.
|
|
Full Story |
This topic does not have any threads posted yet!
You cannot post until you login.