O'Reilly logo

Network Security Architectures by Sean Convery

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. IPsec VPN Design Considerations

 

Oh, how much is today hidden by science! Oh, how much it is expected to hide!

 
 --Friedrich Nietzsche, The Genealogy of Morals, 1887
 

Private information is practically the source of every large modern fortune.

 
 --Oscar Wilde, An Ideal Husband, 1895

Virtual private networks (VPNs) are a means to establish a private network over any other network. Typically, the “other” network is deemed insecure, so traffic sent over it requires some kind of extra protection. The most common example of this is a

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required