In this chapter, you will learn about all the different ways you can secure a Cisco router from hackers and out-of- band threats. We discuss the different services you need to know when configuring a router. We also delve into configuring access lists and the different access lists that are available to you as a network engineer that you can use to protect your network backbone. Threat mitigation is an important aspect of network security, and as a security expert, it is your prime objective to ensure that you protect your network and mitigate threats that arise. |