4.8 Summary

   

A lot of thought and planning has to go into securing your routers, especially at the edge of the network. It can't be said enough that the best type of security approach is one that is layered. Stopping an attack at the edge puts less strain on your internal infrastructure and keeps attackers that much further from your data.

From the edge of the network, the next step is to protect the core of the network. The core of the network is another line of defense. As with the edge, it does take some planning to ensure that you have the greatest level of protection and availability.

   


The Practice of Network Security. Deployment Strategies for Production Environments
The Practice of Network Security: Deployment Strategies for Production Environments
ISBN: 0130462233
EAN: 2147483647
Year: 2002
Pages: 131
Authors: Allan Liska

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net