(This book systematically introduced the concept, origin, configuration, termination and protection of virtual private network, and also commented on the content of virtual private network system structure, encryption tools, related restrictions, firewall structure, etc., and provided many examples. This book is a necessary reference book for network, MIS administrators.)