Chapter 4. Cisco Router Threat Mitigation

Upon completion of this chapter, you will be able to perform the following tasks:

  • Disable Unused Router Services and Interfaces

  • Describe the Differences Between Various Types of Cisco Access Control Lists

  • Design and Build Both Standard and Extended Access Control Lists

  • Use Access Control Lists to Mitigate Common Router Security Threats

  • Implement Syslog Logging

  • Design Secure Management and Reporting for Router Networks

  • Use AutoSecure to Secure Cisco Routers

This chapter describes the risks associated with connecting an enterprise to the Internet and the methods used to reduce those risks. It includes the following topics:

  • Using routers to secure the network

  • Disabling unused security-related router services

  • Disabling ...

Get CCSP Self-Study: Securing Cisco IOS Networks (SECUR) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.