Introduction


In this chapter, you will learn about all the different ways you can secure a Cisco router from hackers and out-of- band threats. We discuss the different services you need to know when configuring a router.

We also delve into configuring access lists and the different access lists that are available to you as a network engineer that you can use to protect your network backbone.

Threat mitigation is an important aspect of network security, and as a security expert, it is your prime objective to ensure that you protect your network and mitigate threats that arise.



CCSP SECUR Exam Cram 2
CCSP SECUR Exam Cram 2 (642-501)
ISBN: B000MU86IQ
EAN: N/A
Year: 2003
Pages: 291
Authors: Raman Sud

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net