Summary

This chapter provided use cases, application examples, and best practice guidelines for the key principles discussed in this book.

We have also offered security notes to these use cases in order to apprise the reader of the potential risks of a deployment. One of the most important principles of this book is that an organization can certainly implement MPLS VPN networks securely.

We also provided use cases for Internet access that are commonly deployed. We have further pointed out the security considerations for some of these scenarios as explained in the previous chapters. We looked at the hybrid model for both Internet and intranet service deployments and highlighted the security considerations for this model.