Conclusion
l
The need for VPN
l
Information Consolidation
l
Security Concerns
l
Access to Private Network
l
Technology of VPN
l
IPsec and Tunneling
l
VPN Implementation
l
FreeSWAN and Networking
l
VPN Applications
l
Virtual Cluster