Conclusion
This brings us to the end of this five-part series of articles. These articles have provided an overview of VPNs with a concentration on using IPSec as a VPN technology. We looked at the technicalities of IPSec and the components that make up IPSec, explored the five-step process of IPSec VPN establishment that included IKE phase 1 and IKE phase 2, and finished by looking at IPSec security associations.