Use this topic to find other sources of VPN information and related topics.
For more VPN configuration scenarios and descriptions, see these other sources of information:
This IBM Redbook provides a step-by-step process for configuring the VPN tunnel using i5/OS™ VPN and the Windows 2000 integrated L2TP and IPSec support.
This redbook explores VPN concepts and describes its implementation using IP security (IPSec) and Layer 2 Tunneling Protocol (L2TP).
This redbook explores all the integrated security features available on the iSeries operation system such as IP filters, NAT, VPN, HTTP proxy server, SSL, DNS, mail relay, auditing, and logging. It describes their use through practical examples.
This Web page highlights late-breaking VPN news, lists the latest PTFs, and links to other sites of interest.
Go here for a list of security related information available online.
You need Adobe Acrobat Reader to view or print these PDFs. You can download a copy from the Adobe Web site (www.adobe.com/products/acrobat/readstep.html).