![]() VLANs and PVLANs provide the tools to keep the devices on the DMZ secure. The switch provides many features, including port security. As with routers, switches have an increasing role in network security. This is why it is important to lock down routers' management interfaces and services to make them difficult for an intruder to hack. Hackers try to infiltrate routers to glean information or use them as launching pads for further attacks. Routers direct traffic in and out of the enterprise network and are usually the first line of defense when the network is connecting to the Internet. This chapter presents information on how to design and configure some important router and switch security features that enable them to run securely and protect the devices that they connect. This makes routers and switches prime targets for hackers to exploit and glean information about the network or simply use as springboards to other devices. Routers and switches provide the connectivity, both within the demilitarized zone (DMZ) environment and to other areas of the network to which the DMZ is connected.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |