Cisco
First Last Name
Name of University
, CISCO2
Question 1
With the changing networks, there is need to protect once devices. New technology has emerged
such as intrusion detection system, the honey ports and intrusion prevention systems. Below are
steps whish one can use to protect their rooter (Cisco fattens security product line, 2004).
First is to control access to the router. This can be done by applying riles that prohibit other
external devices from accessing external parts of the router.
Secondly, one has to restrict the telnet access to the rooter. Though it is not a very safe protocol
to use, though if one wants to really use the protocol one should always use “ssh” the best way to
do this is by employing the standard access class and list (Cisco fattens security product line,
2004).A good example is shown below.