This chapter explains how to secure the corporate campus networking infrastructure. It looks at features specific to equipment provided by Cisco Systems, Inc. and explains how to configure specific devices to incorporate the following elements of a security architecture:
Many of these functions can also be used from other products if they are available. Many examples are given with references to commands used for the various devices most commonly found as part of the corporate network infrastructure:
Network access servers
The configuration examples are guidelines; in many instances, you will have to modify ...