Chapter 4. Cisco Router Threat Mitigation
Upon completion of this chapter, you will be able to perform the following tasks:
Disable Unused Router Services and Interfaces
Describe the Differences Between Various Types of Cisco Access Control Lists
Design and Build Both Standard and Extended Access Control Lists
Use Access Control Lists to Mitigate Common Router Security Threats
Implement Syslog Logging
Design Secure Management and Reporting for Router Networks
Use AutoSecure to Secure Cisco Routers
This chapter describes the risks associated with connecting an enterprise to the Internet and the methods used to reduce those risks. It includes the following topics:
Using routers to secure the network
Disabling unused security-related router services
Disabling ...
Get CCSP Self-Study: Securing Cisco IOS Networks (SECUR) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.