Network devices transport communications required for data and services. These devices include routers, firewalls, switches, servers, and so on. Network devices are perfect targets for cyber criminals.
Several methods to protect various network devices are as follows:
Routers communicate with each other to recognize the most ideal way to convey traffic to various networks. Routers use routing protocols to make routing choices. Routers can also integrate other services. These operations make routers prime targets. The primary threat to network routers are hacking and remote access, attacks against routing protocols. A few strategies to ensure routers are advanced configuration settings, use of secure routing protocols with authentication, and so forth.
The main threat to network switches are theft, hacking, attacks against network protocols. Implementation of port security is required to protect network switches. Port security restricts the number of valid MAC addresses permitted on a port. The switch enables access to devices with authorized MAC (Media Access Control) addresses while it declines other MAC addresses. MAC address is an extraordinary identifier given to a network interface controller.
A firewall filters unapproved or potentially risky traffic from entering the network. Firewall provides basic traffic filtering abilities using access control lists (ACL). Administrators use ACLs to stop traffic or grant just determined traffic on their systems. ACL is a consecutive list of permit or deny statements. Firewalls are a common target of hackers to defeat the firewall protections. The main threat to firewalls is attacks against access control lists. Secure remote access, authentication, and appropriate system updates as needed to protect firewalls.
GeeksforGeeks has prepared a complete interview preparation course with premium videos, theory, practice problems, TA support and many more features. Please refer Placement 100 for details
- Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)
- Traceroute in Network Layer
- Types of Network Topology
- Computer Network | Leaky bucket algorithm
- Program to determine class, Network and Host ID of an IPv4 address
- Network configuration and trouble shooting commands in Linux
- Types of Network Address Translation (NAT)
- HMAC Algorithm in Computer Network
- Introduction of Firewall in Computer Network
- Basic Network Attacks in Computer Network
- Circuit Switching in Computer Network
- Packet Switching and Delays in Computer Network
- Routing v/s Routed Protocols in Computer Network
- Collision Domain and Broadcast Domain in Computer Network
- Difference between Unicast, Broadcast and Multicast in Computer Network
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.