Securing The Network Edge
By Force10 Networks
Network security typically requires pulling together policies at Layer 2 and Layer 3 and at each topology layer to prevent malicious or inadvertent usage. The network boundary – where users enter the network – represents an effective security checkpoint to prevent a single end-point device from either hijacking network resources or impacting the ability of other users to access network services. End-point security traps the misbehaving end-point at its closest point and minimizes the number of network links which must carry any malicious traffic.
This paper details Force10 Networks approach to securing the network edge. Download it now.