Chapter 7

Virtual Private Networks

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

images Use a virtual private network (VPN).

images Use Point-to-Point Tunneling Protocol (PPTP) as an encryption tool for VPNs.

images Use Layer 2 Tunneling Protocol (L2TP) as an encryption tool for VPNs.

images Add security and ...

Get Network Defense and Countermeasures: Principles and Practices, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.