{"id":347,"date":"2015-07-27T09:12:06","date_gmt":"2015-07-27T09:12:06","guid":{"rendered":"https:\/\/learncisco.net\/index.php\/cisco-network-foundation-and-protection-framework\/"},"modified":"2023-01-27T20:01:22","modified_gmt":"2023-01-27T13:01:22","slug":"cisco-network-foundation-and-protection-framework","status":"publish","type":"page","link":"https:\/\/www.learncisco.net\/courses\/iins\/security-on-cisco-routers\/cisco-network-foundation-and-protection-framework.html","title":{"rendered":"Cisco Network Foundation and Protection Framework"},"content":{"rendered":"

Well, as we learn from the first module, networks are getting much more complex and our devices offer a wide variety of services that meet our business needs, and business continuity needs several features and services to ensure the availability under all circumstances. Now connecting to the Internet is pretty much a must-have. So the network devices and infrastructure are going to be exposed to a lot of risks and a lot of threats on a daily basis. So putting together some best practices will help secure your network foundation by protecting network elements and their interactions. In the Internet environment and the cloud computing environment to name a couple, best practices are going to mean distrusting every single packet basically and implementing policies aimed at categorizing traffic. Then different traffic classes will be processed under different policies to make sure that not only forwarded properly but also they’re protected adequately.<\/p>\n

Threats against network infrastructure<\/h2>\n

Okay, here is a list of some common threats to our network infrastructure.<\/p>\n