Chapter 12. Securing VPN, Wireless, and VoIP Networks
A multitude of security technologies have been discussed in this book, and many features specific to Cisco equipment were highlighted. This chapter pulls all of the information together and provides comprehensive design considerations and examples for securing VPN, wireless, and Voice over IP (VoIP) networks when using Cisco-based equipment for your network infrastructures. Specific configurations are not shown because the products to implement the designs vary greatly and have different syntax depending on the products and software versions used. However, references for relevant commands and detailed configuration examples are provided to simplify searching through the Cisco website. Security ...
Get Designing Network Security Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.