Solutions in this chapter:
Shin had configured the first system but, at Marty's request, let Mark and Ming configure the other appliances.
“Wow,” said Mark after he finished his configuration, “that was easy.” Ming nodded in agreement. “Now that we have the base system configured, how do we manage the security and access settings?” Mark turned to Shin. “And how would we go about creating a site-to-site VPN tunnel between HQ and the remote offices?”
Marty looked at Mark with a surprised ...