Terms you'll need to understand:
RFC 2827 filtering
Techniques you'll need to master:
Configuring VPN termination and NAT on a router
Configuring VPN termination and NAT on a PIX
Configuring a VPN concentrator from the VMS
Configuring a VPN client from the VMS
Because the edge is the part (or parts) of your network that faces the outside world, security here is both more complex and more rigorous. Although most attacks actually come from insiders (at least, according to some statistics), you have a considerable degree of control over what protocols and applications are inside the campus. In the outside world, however, with which your edge modules interconnect, there can be anything ...