Authentication Methods
Summary
This chapter showed you the basics of VPN technologies. Understanding the technologies that VPNs use to protect information is useful when attempting to understand how a VPN implements its protection methods. A VPN implementation will use many of the technologies discussed in this chapter.
Next is Chapter 3, "IPsec," where I introduce the interworkings of the IPsec standard for VPNs. Many of the things I discussed in this chapter are used by IPsec to implement protected connections between networks or devices.