Change is life giving; it helps us grow into someone greater than we already are.
By the end of this chapter, you should know and be able to explain the following:
• The difference between the different types of VPNs
• The benefits and goals of VPN technology and how it should be deployed
• Where the encryption modes are and the functions they play in securing VPNs
• The protocols used during the operation of an IPsec VPN
Answering these key questions will enable you to understand the overall characteristics and importance of network security through the use of several different types of VPNs. By the time you finish this book, you will have a solid appreciation for network security, ...