Chapter 9. IPsec Virtual Private Networks (VPNs)

Change is life giving; it helps us grow into someone greater than we already are.

—Success Stories

By the end of this chapter, you should know and be able to explain the following:

• The difference between the different types of VPNs

• The benefits and goals of VPN technology and how it should be deployed

• Where the encryption modes are and the functions they play in securing VPNs

• The protocols used during the operation of an IPsec VPN

Answering these key questions will enable you to understand the overall characteristics and importance of network security through the use of several different types of VPNs. By the time you finish this book, you will have a solid appreciation for network security, ...

Get Network Security First-Step, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.