Securing Your Network With An Internet Access Router (or Getting Your Money's Worth From Your Cisco Gear)

In this document, we will cover the configurations that should be applied to nearly any Cisco router, and routers deployed for Internet access in particular. First, we will look at how to secure the Internet border router from malicious attack. Then, we will discuss how we can utilize the router to...
By
Mark Degner
April 4, 2002

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg