Protecting Cisco IOS from Intrusion
Now that you have a snapshot of modern security concerns, this section looks at Cisco IOS and the configuration commands you can use to deny intruders the ability to harm valuable network resources that are typically connected behind a Cisco router. In particular, this section covers how you can stop DoS attacks.
Figure 8-2 displays a typical network scenario. You see how to configure the router, separating the public and private networks so that the private network is not vulnerable.
Figure 8-2. Typical Internet Connection on R1
Example 8-1 configures the Router R1 to enable the Nagle algorithm defined in RFC ...