In this chapter you will explore methods for applying security to transmitted data at the application layer. Once you make configuration changes, application security works seamlessly. The application, however, must support the application-layer security.
To complete this chapter you must read the chapter scenario. This scenario is used throughout the chapter to apply the design decisions discussed in each lesson.