Chapter 24. Case Study
This chapter is different from the rest of the chapters in this book. From the beginning of this book, each chapter has focused on VPNs and various VPN implementation types, and how these are configured on Cisco VPN 3000 concentrators, software and hardware clients, IOS-based routers, and PIX and ASA security appliances. Throughout the book I’ve tried to include many configuration examples, illustrating common scenarios and possible problems you might face while implementing VPNs.
This chapter doesn’t introduce any new material. Instead, this chapter will focus on the use of the concepts and features discussed in this book and implement many of them in a case study environment. In other words, I’ll create a fictitious ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access