O'Reilly logo

Cisco Router Firewall Security by Richard A. Deal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. Routing Protocol Protection

This chapter focuses on routing security. Up to this point, I have focused on nonrouting functions, such as using filters to prevent unauthorized access. However, your router will have to perform some basic routing functions, and this brings up concerns related to network failures and service interruptions that a spoofed routing attack might create, as well as access and Denial of Service (DoS) attacks.

Most people assume that if they use static routes, they are protected against routing attacks. However, static routes are not scalable in large internetworks. In these situations, a routing protocol typically is used on the perimeter router to help the router find internal routes. In some cases, you need ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required