This section examines the moving parts and pieces involved with IPsec. This section presumes that you’ve read the previous chapters and already have an understanding of VPN technologies and public key infrastructure (PKI).