In this chapter, you learned how to secure VPNs. Like every other chapter, we started from the basics and went from cryptology techniques to VPNs, because having a clear understanding of the aspects of a technology will give penetration testers a clearer vision to know how to secure that technology.
In the next chapter, we will discuss common security vulnerabilities which may be present in switches and routers and offers advice on keeping network devices secure.