Security Lab Scenario
This Lab scenario is designed to illustrate the basics of security from the ISP's point of view and from the customer's point of view. Because of the differences in the ISP's role and the customer's role, the security configurations will be substantially different on each side of the demarc between the two sides. This lab is a walk through. Security is configured step-by-step.
by David Wolsefer
Introduction
Topology
Initial Configuration
ISP Side
Logging Task List
Anti-spoofing Task List
Remaining Security Configurations
ISP Solution
Logging Task List
Anti-spoofing Task List
Remaining Security Configurations
Customer Side
Logging Task List
Anti-spoofing Task List
Remaining Security Configurations
Customer Solution
Logging Task List
Anti-spoofing Task List
Remaining Security Configurations
Suggestion
Conclusion
|
|
Copyright © 2002 Genium
Publishing
Corporation