Chapter 2. Securing the Perimeter

Security Policy for Cisco Routers

Because the perimeter router is on the dividing edge between the outside world and the inside of a network, much emphasis is often placed on securing the network at this point. It is reasonable to expect that along with a networkwide security policy, device-specific security policy will be included. This device-specific security policy is a means of implementing the requirements of the networkwide security policy. This chapter covers many of the aspects of securing a perimeter device.

Securing Administrative Access

There are many avenues of access to Cisco devices. These include console connections, Telnet and Secure Shell (SSH) connections to virtual terminals, auxiliary port ...

Get CCSP SND Quick Reference now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.