To recap, we opened the chapter by discussing the purpose of a VPN and how it can assist an organization, whether large or small, to connect their branch offices securely over the internet. Furthermore, we took a look at various deployment models for real-world use cases of each type of deployment. We then dove a bit into other methods of remotely administering and managing a system over a network in a secure fashion. We saw the importance of having policies implemented in an organization to assist in the preservation and security of the network infrastructure, assets, and data.
In the next chapter, we will discuss various network security concepts.