Professional Documents
Culture Documents
Juniper JUNOS Basic Hardening Guide
Juniper JUNOS Basic Hardening Guide
Juniper JUNOS Basic Hardening Guide
Basic
Hardening
Guide
The configuration and operation techniques discussed are intended to
accomplish minimum router security, by Juniper Networks. They are best
common practices recommended to help secure the router infrastructure,
which is only one part of an overall network security strategy.
Another common form of attack is a TCP SYN flood, in which the attacker
uses a script or program to create TCP connection requests (SYN messages)
at a rate faster than the victim releases them. For this reason, rate-limiting
TCP SYN messages is also recommended.