Chapter 1. Introduction to Remote Access VPN Technologies
This chapter covers the following topics
Since the advent of the Internet, network administrators have looked for ways to leverage this low-cost, widespread medium to transport data while protecting data integrity and confidentiality. They looked for ways to protect the information within the data packets while providing transparency to the end user. This spawned the concept of Virtual Private Networks (VPN). Subsequently, the Internet Engineering Task Force (IETF) was engaged to craft standard protocols and procedures to be used by all vendors of VPNs for data protection and confidentiality.
The IETF defined a number of VPN protocols, including ...
Get SSL Remote Access VPNs now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.