A Checklist for Developing Defenses

Step

Description

Define your requirements.

Determine what you are protecting, what the performance requirements for your network are, and the level of security needed. This will help to select the appropriate technologies.

Evaluate solutions.

Once you have defined your requirements, you now need to evaluate available solutions. Build a roster of vendors that you wish to consider based on the company as well as the technology.

Deploy your firewall.

Once you have procured your solution, it is now a matter of deploying it. This chapter has outlined the steps, in principle, that will allow you to do that.

Recommended Reading

  • RFC 2267

  • http://www.juniper.net/techpubs/software/junos/junos71/swconfig71-routing/html/routing-generic-config12.html

  • http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur_c/fothersf/scfrpf.htm



Extreme Exploits. Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net