Chapter 10
Securing User Traffic
In this chapter, you learn the following:
The breadth of the network-based controls available to protect users and data, and ensure compliance with industry best practice.
The use cases for features such as firewalling, Geo-IP firewalling, IDS/IPS, and content filtering. This chapter also shows how to implement these features.
The security capabilities available as part of Meraki MX security appliances, MR access points, and Secure Connect. The intention here is to help administrators decide where best to implement these controls.
How to create a unified Secure Access Service Edge (SASE) using Cisco Secure Connect. This includes how to configure DNS, firewall, Web, and Data Loss Prevention (DLP) policies for ...
Get Securing Enterprise Networks with Cisco Meraki now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.