Virtual Private Networks
Several standards use encrypted tunnels between a computer or a remote network and a private network through the Internet (Figure 9.15), resulting in what is called a virtual private network (VPN).
image
FIGURE 9.15   VPN connecting computers across the United States
An encrypted tunnel requires endpoints—the ends of the tunnel where the data is encrypted and decrypted. In the tunnels you’ve seen thus far, the client for the application sits on one end and the server sits on the other. VPNs do exactly the same thing. Either some software running on a computer or, in some cases, a dedicated box must act as an endpoint for ...

Get Mike Meyers’ CompTIA Network+ Certification Passport, 4th Edition (Exam N10-005), 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.