O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Network Security Checklist

This part of the checklist concerns routers, firewalls, and other network-level devices in a TCP/IP network, and their recommended configuration. One of the approaches to network security utilizes the Open Systems Interconnection (OSI) Reference Model used to describe network protocols and devices. In the OSI Model, everything in a network is divided into seven categories, called layers, from the physical layer up to the application layer, as follows:

  1. Physical layer

  2. Data link layer

  3. Network layer

  4. Transport layer

  5. Session layer

  6. Presentation layer

  7. Application layer

The approach is to secure the entire network and its nodes from the bottom up. In other words, you start with the first layer, physical (securing equipment, cables, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required