Network Security Policies

IP networks are susceptible to unsecured intruders using a number of different methods. Through the campus, by dialup, and through the Internet, an intruder can view IP data and attack vulnerable network devices.

IP networks must provide network security for the following reasons:

  • Inherent technology weaknesses— All network devices and operating systems have inherent vulnerabilities.

  • Configuration weaknesses— Common configuration mistakes can be exploited to open up weaknesses.

  • Network policy— The lack of a network policy can lead to vulnerabilities, such as password security.

  • Outside/inside intruders— Internal and external people always want to exploit network resources and retrieve sensitive data.

Every IP network ...

Get CCIE Security Exam Certification Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.