About this chapter: Whether your background is security or networking, you can use this chapter to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. This chapter covers physical security issues, Layer 2 security considerations, routing considerations, and IP addressing, ICMP, transport protocol, and DoS design considerations.
About this book: This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy.
Excerpted from Network Security Architectures by Sean Convery (ISBN: 158705115X).
Copyright © 2006, Cisco Press. All rights reserved.