Conclusion
This chapter showed you some methods for making a secure connection from one site to another or from a remote user to the corporate network. This chapter is linked closely to Chapter 13 because, in many cases, VPNs and PKIs are used together.