Conclusion
l The need for VPN
l Information Consolidation
l Security Concerns
l Access to Private Network
l Technology of VPN
l IPsec and Tunneling
l VPN Implementation
l FreeSWAN and Networking
l VPN Applications
l Virtual Cluster