O'Reilly logo

Cisco Router Configuration Handbook, Second Edition by Andrew Whitaker, Steve McQuerry - CCIE No. 6108, Dave Hucaby - CCIE No. 4594

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Router Security

This chapter discusses how to configure and use the following network security features:

12-1: Suggested Ways to Secure a Router—The Cisco IOS software provides a wide range of functionality on a router. This section gives you a set of tips on how to close down unnecessary router services and control access to the router itself.

12-2: Authentication, Authorization, and Accounting (AAA)—A router can interface with external servers to authenticate incoming users, grant or deny permission to specific network resources, and maintain an audit trail for billing or logging purposes.

12-3: Dynamically Authenticate and Authorize Users with Authentication Proxy—A router can intercept HTTP traffic and require user authentication ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required