Download now Free registration required
Once the security policy is created, one can move forward with securing the network devices. The process has reviewed for hardening the Router, Firewall, and VPN Concentrator in ways that parallel the requirements of the security policy. The process for configuring each device centers on each device's strong points. ACLs is used, routing, and packet rate limiting as a few examples of available router options.
- Format: PDF
- Size: 152.5 KB