This has been a busy chapter, but it has provided you with an important baseline. With its many security technologies and many layers of implementation of them, the SAFE Blueprint mitigates a number of network threats. Here are a few that we have developed just from technology placement:
As you look at the products in Chapters 8 and 9, you will see more ways in which the SAFE design mitigates threats to your network. Before you can do that, however, you need to look at the other versions of SAFEthe extensions of the blueprint to VPNs, IP telephony, wireless, and (for our purposes, the most important) the small and midsize business networks and remote access (SMR). Those are the subject of Chapter 7. |