This chapter is different from the rest of the chapters in this book. From Chapter 3, "Accessing a Router," onward, each chapter discussed security issues and the Cisco IOS features that you could use to deal with these issues, including configuration commands. Each chapter included examples of using these commands in a networking environment.
This chapter does not introduce any new material. Instead, it focuses on implementing the concepts and features discussed in this book in a case-study environment.