Chapter 2. Securing the Perimeter
Security Policy for Cisco Routers
Because the perimeter router is on the dividing edge between the outside world and the inside of a network, much emphasis is often placed on securing the network at this point. It is reasonable to expect that along with a networkwide security policy, device-specific security policy will be included. This device-specific security policy is a means of implementing the requirements of the networkwide security policy. This chapter covers many of the aspects of securing a perimeter device.
Securing Administrative Access
There are many avenues of access to Cisco devices. These include console connections, Telnet and Secure Shell (SSH) connections to virtual terminals, auxiliary port ...