To conclude this chapter, we've taken a look at IPSec and its importance in VPNs. We are now able to understand the terminologies and jargon being used during the configurations and discussions in the industry, the fundamentals and concepts behind Internet Security Association and Key Management Protocol, and the definition and application of Internet Key Exchange.
In the next chapter, we dive into configuring a Site-to-Site VPN.