Conclusion
Now that you know how to set up and configure VPNs from Chapter 12 and PKIs from this chapter, you should be able to install certificates and play with them in your own environment. PKIs make it easier to maintain a secure setup. PKIs use a CA for the distribution of the different keys that might be needed for connecting to a device or even to a website, as shown in the case study.