| |
In Part 2 of this tutorial, we will examine in more detail how
to use the technologies of VPNs, and finish up with some VPN
implementations. The discussion will build on what has been covered here
in Part 1, so keep your notes handy. You are taking copious notes
about all this, right?
|