{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

CCNA-Security-Ch2-Securing-Network-Devices.pdf

CCNA-Security-Ch2-Securing-Network-Devices.pdf - CCNA...

Info icon This preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
1 © 2009 Cisco Learning Institute. CCNA Security Chapter Two Securing Network Devices
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
2 © 2009 Cisco Learning Institute. The Edge Router What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as the first and last line of defense - Implements security actions based on the organization’s security policies How can the edge router be secured? - Use various perimeter router implementations - Consider physical security, operating system security, and router hardening - Secure administrative access - Local versus remote router access
Image of page 2