on the public edge, attacks occure, the question is when it happenes how to deal with them.
On your device you have 3 area's to look after: Data Plane, Control Plane and Management plane. within each area you can limit the input / output traffic's src and dst to ur trusted ones. although you can take some protection measures for known attacks and worms, if there is any special attacks u r facing, u have to identify and avoid them with the tools available: NetFlow, ACL, uRPF, IP Source Tracker, QoS, RTBH, CoPP, etc.
of course some ppl pay tons of money for dynamic protection solutions, and some go on their own
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
As far as attacks go, if it's on a public addressable network, it doesn't matter what device it is,
it can get attacked theortically.
"... it doesn't matter ...", yes and no. Firewalls generally default to blocking everything, you need to open them up for selected traffic. "Normal" network routers generally default to allow everything, you need lock them down.
"Best practice" is generally using a firewall to protect your Internet edge as that's what the device is designed for. However, a properly hardened router gains little benefit by being protected by a firewall but the firewall can better protect the rest of your interior network. So, if you're going to have a firewall for the latter reason, it can make sense, if possible and practical, to also protect your Internet edge router too.
Hi I have this primary configuration on the primary CSR Router in the HA
mode in same AZ but I am not seeing failover to secondary CSR I am
seeing on the backup router that the API call was successful. 10 10 Actv
success Thu Jun 9 18:13:50 2016 syslog app...
In today’s modern networks the interaction between applications and
network infrastructures is increasingly important for service providers,
content providers and enterprise businesses. The more network operators
can interact with the network the more opt...