Security Lab Scenario
This Lab scenario is designed to illustrate the basics of security from the ISP's point of view and from the customer's point of view. Because of the differences in the ISP's role and the customer's role, the security configurations will be substantially different on each side of the demarc between the two sides. This lab is a walk through. Security is configured step-by-step.
by David Wolsefer
Introduction
Topology
Initial Configuration
ISP Side
  Logging Task List
  Anti-spoofing Task List
  Remaining Security Configurations
ISP Solution
  Logging Task List
  Anti-spoofing Task List
  Remaining Security Configurations
Customer Side
  Logging Task List
  Anti-spoofing Task List
  Remaining Security Configurations
Customer Solution
  Logging Task List
  Anti-spoofing Task List
  Remaining Security Configurations
Suggestion
Conclusion
    
        |  |  | 
    
        Copyright © 2002 Genium
Publishing
Corporation