| ||
As you can see, Cisco provides a wide range of solutions capable of protecting your network at any hierarchical layer independently of the network's topology. The next chapter will provide a brief review of all Cisco network security elements we have mentioned here.
Network security should be considered and developed from the earliest design stage. Unfortunately, Cisco network design guides do not pay sufficient attention to this fact. The topologies and models of network design suggested by Cisco possess unique security-relevant peculiarities that should be taken into account when developing the security policy, deploying, and protecting the network. Black Hats look out for badly , chaotically designed networks that are difficult to manage, monitor, upgrade, and troubleshoot. Don't make your network appear at the top of their hit list.
| ||