POSTSCRIPT
This chapter provides a practical overview of VPN and IPSec. As the examples illustrate, these technologies can be used together, or IPSec can be configured as a replacement to VPN. We discuss these technologies by example rather than abstract theory. Your environment will likely be different from the examples provided. However, when broadly applied, the steps covered here should provide a reasonable approach to deploying VPN and IPSec.