Ask the Expert

How can network security be audited?

What security does the network provide? How can the security be audited?

    Requires Free Membership to View

Depends on the network. Cisco routers support Access Control Lists (ACLs) for perimeter/border security; Cisco PIX supports Security Policies for firewall (or 2nd level of defense) security ? both support Secure Shell (SSH) encryption and anti-spoofing and anti-Denial of Service (DoS) attacks, to name a few options. Servers support TCP/IP filtering and auditing. Application layer firewalls further compliment network firewalls and Intrusion Detection Systems (IDS). Desktop firewall also compliment network firewalls. Read through my series for security tips on improving network security.

This was first published in May 2003

Join the conversationComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.