O'Reilly logo

Designing Network Security Second Edition by Merike Kaeo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Securing VPN, Wireless, and VoIP Networks

A multitude of security technologies have been discussed in this book, and many features specific to Cisco equipment were highlighted. This chapter pulls all of the information together and provides comprehensive design considerations and examples for securing VPN, wireless, and Voice over IP (VoIP) networks when using Cisco-based equipment for your network infrastructures. Specific configurations are not shown because the products to implement the designs vary greatly and have different syntax depending on the products and software versions used. However, references for relevant commands and detailed configuration examples are provided to simplify searching through the Cisco website. Security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required