![]() |
An entire network can be protected from external threats at a single location: the entry and exit point to that network. By design, most of our network devices can help us protect our internal hosts; we just have to configure them to do so. It is very easy to mis-configure one workstation out of the hundreds that may be on our networks. The importance of the security settings on the network device itself is often overlooked. Straight out of the box, most network devices are not very secure and might not address security at all. |