August 2004
Intermediate to advanced
912 pages
28h 22m
English
This chapter is different from the rest of the chapters in this book. From Chapter 3, “Accessing a Router,” onward, each chapter discussed security issues and the Cisco IOS features that you could use to deal with these issues, including configuration commands. Each chapter included examples of using these commands in a networking environment.
This chapter does not introduce any new material. Instead, it focuses on implementing the concepts and features discussed in this book in a case-study environment.
The network shown in Figure 21-1 illustrates this case study. The company in this network has two sites—a corporate and branch office—as well as remote access users that connect through the Internet. The ...
Read now
Unlock full access