General Design Considerations -- Chapter 6 of 'Network Security Architectures'

Whether your background is security or networking, you can use Chapter 6 of 'Network Security Architectures' to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. This chapter covers physical security issues, Layer 2 security considerations, routing considerations, and IP addressing, ICMP, transport protocol, and DoS design considerations.

About this chapter: Whether your background is security or networking, you can use this chapter to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. This chapter covers physical security issues, Layer 2 security considerations, routing considerations, and IP addressing, ICMP, transport protocol, and DoS design considerations.

About this book: This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy.

Read the rest of General Design Considerations in this PDF.


Excerpted from Network Security Architectures by Sean Convery (ISBN: 158705115X).

Copyright © 2006, Cisco Press. All rights reserved.

This was first published in November 2006

Dig deeper on Network Design

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close