Now that we have taken a look at the building blocks for IPsec, let’s apply what you have learned to the topology introduced at the beginning of the chapter in Figure 6-1.