Network Security Fundamentals [Electronic resources]

Gert De Laet, Gert Schauwers

نسخه متنی -صفحه : 196/ 115
نمايش فراداده

Conclusion

Now that you know how to set up and configure VPNs from Chapter 12 and PKIs from this chapter, you should be able to install certificates and play with them in your own environment. PKIs make it easier to maintain a secure setup. PKIs use a CA for the distribution of the different keys that might be needed for connecting to a device or even to a website, as shown in the case study.