Chapter 12. Securing VPN, Wireless, and VoIP Networks

A multitude of security technologies have been discussed in this book, and many features specific to Cisco equipment were highlighted. This chapter pulls all of the information together and provides comprehensive design considerations and examples for securing VPN, wireless, and Voice over IP (VoIP) networks when using Cisco-based equipment for your network infrastructures. Specific configurations are not shown because the products to implement the designs vary greatly and have different syntax depending on the products and software versions used. However, references for relevant commands and detailed configuration examples are provided to simplify searching through the Cisco website. Security ...

Get Designing Network Security Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.