(This book systematically introduces the concept, origin, configuration, implementation and maintenance of virtual private network. It also discusses the architecture of virtual private network, encryption tools, relevant restrictions, firewall structure and so on, and provides a large number of examples. This book is a necessary reference book for network and MIS administrators.)