ABSTRACT

The Internet has graduated from simple sharing of e-mail to business-critical applications that involve

incredible amounts of private information. The need to protect sensitive data over an untrusted medium

has led to the creation of virtual private networks (VPNs). A VPN is the combination of tunneling,

encryption, authentication, access control, and auditing technologies and services used to transport

traffic over the Internet or any network that uses the TCP/IP protocol suite to communicate.