9.3. Summary

In this chapter we defined the term virtual private networking and discussed when it is beneficial to use a VPN. We also covered what you should look for in a VPN product and what your options are for deployment. Finally, we walked through the steps for configuring a VPN between Microsoft Windows 2000 Professional, and Windows 2000 Server and looked at the effect this configuration has on the passing data stream.

In the next chapter, we'll look at viruses and how you keep these little pieces of destructive code off your network.

Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.