the tunneling + authentication + encryption link allows
transfer data between two points through a public network, simulating the operation of a private
(local) network. In other words, these tools allow you to build a virtual
private network VPN
There are several ways to use a VPN. The most common scenario is when a remote user accesses a private network via the Internet using a remote access VPN connection. In another case, the remote office connects to the corporate network using either a perma...