Protecting a VPN With IPsec (Task Map)
The following table points to procedures that configure IPsec to protect traffic across
the Internet. These procedures set up a secure virtual private network (VPN) between
two systems that are separated by the Internet. One common use of this
technology is to protect traffic between home workers and their corporate office.