If you take the time to implement the recommendations outlined in this chapter, you will probably find that it is not nearly as simple in practice as we have made it sound. This is fully expected. Remember the fundamental tradeoff in Chapter 1, "Introduction to Network Protection." If you want a network that is secure and useful, we can give you that, but you have to put in some effort and spend some time at it. Security is not free. As vendors get more advanced, it will become less costly; right now, however, this takes time. Be sure to document every step you take painstakingly, and please , do not try these things on your production servers. Use virtual machines or a test lab to test all these steps out, unless you rather like searching for a job. |