Secure IOS Template

So far, this chapter has covered the different ways to secure your router and use it as a supplement to a dedicated firewall. This section explores how to harden your router and some of the best practices available for making the router a more secure device on your network. For the sake of brevity, you will not see coverage of every single ACL and command possible to secure your router. Following are a couple reasons for this choice:

• The physical constraints of this book do not allow it, so content must be prioritized. Some items left out are specific to certain businesses in networking (ISPs, for example); most networks easily use the remaining items.

• Certain parts of the recommendations, such as TACACS and RADIUS, are ...

Get Network Security First-Step, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.