This chapter is from the book
Summary
In this chapter, we talked about the different ways you can provide additional security to your network by doing the following:
Setting up encrypted passwords
Turning off all unwanted services
Configuring different access levels
Using different access lists to filter all unwanted traffic out of your network and mitigate threats such as IP spoofing and DoS attacks on your network