Chapter 2. Securing the Perimeter
Security Policy for Cisco Routers
Because the perimeter router is on the dividing edge between the outside world and the inside of a network, much emphasis is often placed on securing the network at this point. It is reasonable to expect that along with a networkwide security policy, device-specific security policy will be included. This device-specific security policy is a means of implementing the requirements of the networkwide security policy. This chapter covers many of the aspects of securing a perimeter device.
Securing Administrative Access
There are many avenues of access to Cisco devices. These include console connections, Telnet and Secure Shell (SSH) connections to virtual terminals, auxiliary port ...
Get CCSP SND Quick Reference now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.