Summary

This chapter introduced you to the concept of virtual private networks. As I mentioned in the chapter introduction, I’ll expand on many of the topics and issues discussed here in future chapters.

Next up is Chapter 2, “VPN Technologies,” where I delve further into technologies used by VPNs to provide protection for data, such as keys, encryption algorithms, hashing functions, and authentication methods.

Get The Complete Cisco VPN Configuration Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.