Chapter 22. Securing Your Network Equipment Against Security Breaches

Much of this book revolves around concepts of high availability from a networking perspective. But it’s equally important to remember that maintaining uptime includes considerations for the device itself. As this chapter discusses, securing the device to prevent it from being attacked or hacked is as important as any other effort put toward constant uptime. Without a strong security implementation on the device itself, all of your other efforts may go to waste.

Get JUNOS High Availability now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.