In this chapter, you learn how to deploy virtual private networks (VPNs). This chapter addresses the following topics:
So far in Part II of this book, "Securing Network Infrastructures with ASDM," the deployment section of defense in depth is complete. This chapter covers how to leverage your existing network and extend defense in depth to users who need access to your network from remote sites. |