Chapter Download

General Design Considerations -- Chapter 6 of 'Network Security Architectures'

About this chapter: Whether your background is security or networking, you can use this chapter to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. This chapter covers physical security issues, Layer 2 security considerations, routing considerations, and IP addressing, ICMP, transport protocol, and DoS design considerations.

About this book: This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy.

Read the rest of General Design Considerations in this PDF.

Excerpted from Network Security Architectures by Sean Convery (ISBN: 158705115X).

Copyright © 2006, Cisco Press. All rights reserved.

This was first published in November 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: