ABSTRACT

This chapter discusses various network infrastructure devices, such as routers, switches, and network printers, and how to configure and manage them securely. A router or switch that resides between firewall and Internet access provider or between firewall and internal network forms a key security point that should be adequately protected. The most common form of information-gathering attack is the password attack. Denial–of–service attacks exploit known weaknesses in networking protocols and their functionality, focusing on Transmission Control Protocol, User Datagram Protocol, and Internet Control Messaging Protocol. SYN floods, broadcast amplification, and smurf attacks are just a few of the available attacks. The Simple Network Management Protocol is one of the most widely used tools for network device management and monitoring. Routers are the heart of the network. The service password–encryption command encrypts this information in the configuration file. These log messages can be sent to a variety of points, including syslog servers, console, and VTY sessions.