(This book systematically introduces the concept, source, configuration, completion and protection of virtual private network. It also discusses the content of virtual private network system structure, encryption tools, related constraints, firewall structure, etc., and provides many examples. This book is a necessary reference book for network, MIS administrators.)