
Les A. answered 05/07/20
Computer Scientist
1. Determine what sensitivity of data requires the use of a VPN to protect the information.
2. Authenticate the network peer and set up the secure channel.
3. Negotiate the set-up of the channel with the peer to set up the VPN.
4. Begin the transfer of data between the peers using the VPN secure channel.
5. Close the channel and delete all of the related VPN management data when traffic data has been completely exchanged.