Ask the Expert

How can network security be audited?

What security does the network provide? How can the security be audited?

    Requires Free Membership to View

Depends on the network. Cisco routers support Access Control Lists (ACLs) for perimeter/border security; Cisco PIX supports Security Policies for firewall (or 2nd level of defense) security ? both support Secure Shell (SSH) encryption and anti-spoofing and anti-Denial of Service (DoS) attacks, to name a few options. Servers support TCP/IP filtering and auditing. Application layer firewalls further compliment network firewalls and Intrusion Detection Systems (IDS). Desktop firewall also compliment network firewalls. Read through my series for security tips on improving network security.

This was first published in May 2003

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: