(This book systematically introduces the concept, origin, configuration, implementation and protection of virtual private network. It also discusses the system structure of virtual private network, encryption tools, related restrictions, firewall structure, etc., and provides many examples. This book is a necessary reference book for network, MIS administrators.)