Tip

Network Security: The Complete Reference

Mark Rhodes-Ousley, Roberta Bragg and Keith Strassberg

Chapter 10 - Network Device Security

This excerpt is reprinted with permission from McGraw-Hill, copyright 2003. For more information or to order the book, click here.

    Requires Free Membership to View

This chapter focuses on using routers and switches to increase the security of the network as well as providing appropriate configuration steps for protecting the devices themselves against attacks. Cisco routers are the dominant platform in use today, so where examples are provided, the Cisco platform will be discussed. This does not mean that Cisco is the only platform available - routers and switches from leading companies, such as Juniper Networks, Foundry Networks, and Extreme Networks, perform similar if not identical functions. (This excerpt is reprinted with permission by The McGraw-Hill Companies, copyright 2003. All rights reserved.)

To obtain Chapter 10, click here.

This was first published in December 2003

Join the conversationComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.

    Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.