4.8. Summary

A lot of thought and planning has to go into securing your routers, especially at the edge of the network. It can’t be said enough that the best type of security approach is one that is layered. Stopping an attack at the edge puts less strain on your internal infrastructure and keeps attackers that much further from your data.

From the edge of the network, the next step is to protect the core of the network. The core of the network is another line of defense. As with the edge, it does take some planning to ensure that you have the greatest level of protection and availability.

Get The Practice of Network Security: Deployment Strategies for Production Environments now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.