That is the small network: an uncomplicated edge that must nonetheless be thoroughly secured, and a simple campus, which might not even have Layer 3 traffic management. Though small in scale, it is enough to give us a handle on the process of putting all the pieces together into a coherent secured network design secured according to the organization's policy and technology choices. In Chapter 11, we expand our view by going through the same exercise with the midsize network, which follows the same principles but differs in the details. |