Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Don't Panic. Plan: Page 8 of 8



E-Poll Results
click to enlarge

• Block protocols at the router: Some traffic--such as NetBIOS, SNMP and some ICMP types, including echo request, time request and subnet request--shouldn't traverse the border. Just drop it all at the router and be done with it. That way, even if a badly configured firewall crops up, the traffic won't leak out.

• Implement tiered defenses: If you have one border router between your network and the world, what happens if it is compromised? Examine your traffic flows and design your network to restrict flows even if components fail.