General Design Considerations -- Chapter 6 of 'Network Security Architectures'

About this chapter: Whether your background is security or networking, you can use this chapter to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. This chapter covers physical security issues, Layer 2 security considerations, routing considerations, and IP addressing, ICMP, transport protocol, and DoS design considerations.

About this book: This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy.

Read the rest of General Design Considerations in this PDF.


Excerpted from Network Security Architectures by Sean Convery (ISBN: 158705115X).

Copyright © 2006, Cisco Press. All rights reserved.


This was first published in November 2006

Join the conversationComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.