Summary

This chapter introduced you to the concept of virtual private networks. As I mentioned in the chapter introduction, I'll expand on many of the topics and issues discussed here in future chapters.

Next up is Chapter 2, "VPN Technologies," where I delve further into technologies used by VPNs to provide protection for data, such as keys, encryption algorithms, hashing functions, and authentication methods.





The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide
ISBN: 1587052040
EAN: 2147483647
Year: 2006
Pages: 178
Authors: Richard Deal
Simiral book on Amazon

Flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net