Watch this video on YouTube
An organization wishes to provide point-to-point transmission of authentication and data traffic over an untrusted network. What network design concept should be employed?