ABSTRACT
The Internet has graduated from simple sharing of e-mail to business-critical applications that involve
incredible amounts of private information. The need to protect sensitive data over an untrusted medium
has led to the creation of virtual private networks (VPNs). A VPN is the combination of tunneling,
encryption, authentication, access control, and auditing technologies and services used to transport
traffic over the Internet or any network that uses the TCP/IP protocol suite to communicate.