Topics covered in this chapter include
■ IDS/IPS Technology
■ Use Case Examples of Centralized and Distributed VNF Placement
The previous chapter focused on technologies to identify endpoints, provide adaptable authentication mechanisms to ensure that an endpoint is what it claims to be, and then provide the appropriate level of access privileges based on its identity. That technology is engaged before the endpoint ...