Chapter 7

Virtual Private Networks

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

images Use a virtual private network (VPN).

images Use Point-to-Point Tunneling Protocol (PPTP) as an encryption tool for VPNs.

images Use Layer 2 Tunneling Protocol (L2TP) as an encryption tool for VPNs.

images Add security and ...

Get Network Defense and Countermeasures: Principles and Practices, Third edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.