O'Reilly logo

Implementing Cisco Networking Solutions by Harpreet Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing the network perimeter

Most of the attacks generally originated from outside the network perimeter. The network perimeter is always treated as the boundary between inside and outside networks. Therefore, it is very important to secure this perimeter. Some of the security devices/technologies used at the network perimeter from a security perspective are firewalls and services protection systems.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required