Chapter 8. Collecting the Non-Volatile Data from a Router
Solutions in this chapter:
▪ Before You Connect to the Cisco Router
▪ Connecting to the Cisco Router
▪ Router Non-Volatile Data Collection Procedures
▪ Router Commands to Run on theCisco Router
▪ Analysis of Gathered Non-Volatile Router Data from a Cisco Router
Frequently Asked Questions
When you think about network security issues today, immediate thoughts of the many credit card and personal information disclosures that seem to be highlighted as a regular occurrence in the media come to mind. Routers are rarely if ever mentioned as having played any part in a high-profile cybercrime incident.
Routers most often silently play a large part ...