Summary

This chapter showed you a case study using the many security features discussed in this book. By no means is this the only possible solution to the given problem; however, the goal of this chapter is to show you how to implement Cisco security features in an integrated manner. As you will learn, each networking situation has its own set of unique problems and issues, as well as possible solutions.

TIP

As you can see from this case study, even though the network is small, the configuration is quite complex. Therefore, I highly recommend that you implement one component at a time, making the setup and troubleshooting process easier. As a final note, good luck with your security endeavors!