This section covers the moving parts and pieces involved with the public key infrastructure. This section presumes that you’ve read the previous sections regarding VPN technologies.