{"id":1290,"date":"2018-09-07T17:54:46","date_gmt":"2018-09-07T10:54:46","guid":{"rendered":"https:\/\/lagonet.vn\/?p=1290"},"modified":"2018-09-07T17:54:46","modified_gmt":"2018-09-07T10:54:46","slug":"security-router-facing-into-internet-border-router-internet-access-router","status":"publish","type":"post","link":"https:\/\/kb.lagonet.vn\/?p=1290","title":{"rendered":"SECURITY ROUTER FACING INTO INTERNET\/ BORDER ROUTER\/ INTERNET ACCESS ROUTER"},"content":{"rendered":"<p><a href=\"https:\/\/www.google.com.vn\/search?q=acl+to+protec+border+router&amp;oq=acl+to+protec+border+router&amp;aqs=chrome..69i57.11683j0j7&amp;sourceid=chrome&amp;ie=UTF-8\">https:\/\/www.google.com.vn\/search?q=acl+to+protec+border+router&amp;oq=acl+to+protec+border+router&amp;aqs=chrome..69i57.11683j0j7&amp;sourceid=chrome&amp;ie=UTF-8<\/a><\/p>\n<p><a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/networkdevs\/securing-network-internet-access-router-or-moneys-worth-cisco-gear-242\">https:\/\/www.sans.org\/reading-room\/whitepapers\/networkdevs\/securing-network-internet-access-router-or-moneys-worth-cisco-gear-242<\/a><\/p>\n<p><a href=\"https:\/\/searchnetworking.techtarget.com\/tip\/Protecting-your-border-routers\">https:\/\/searchnetworking.techtarget.com\/tip\/Protecting-your-border-routers<\/a><\/p>\n<p><a href=\"https:\/\/www.cymru.com\/Documents\/secure-ios-template.html\">https:\/\/www.cymru.com\/Documents\/secure-ios-template.html<\/a><\/p>\n<p><a href=\"https:\/\/insights.sei.cmu.edu\/sei_blog\/2017\/05\/best-practices-for-network-border-protection.html\">https:\/\/insights.sei.cmu.edu\/sei_blog\/2017\/05\/best-practices-for-network-border-protection.html<\/a><\/p>\n<p><a href=\"https:\/\/community.cisco.com\/t5\/routing\/acl-on-border-router\/td-p\/1348932\">https:\/\/community.cisco.com\/t5\/routing\/acl-on-border-router\/td-p\/1348932<\/a><\/p>\n<p><a href=\"https:\/\/community.cisco.com\/t5\/routing\/border-router-acl-and-good-practices\/td-p\/477743\">https:\/\/community.cisco.com\/t5\/routing\/border-router-acl-and-good-practices\/td-p\/477743<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/www.google.com.vn\/search?q=acl+to+protec+border+router&amp;oq=acl+to+protec+border+router&amp;aqs=chrome..69i57.11683j0j7&amp;sourceid=chrome&amp;ie=UTF-8 https:\/\/www.sans.org\/reading-room\/whitepapers\/networkdevs\/securing-network-internet-access-router-or-moneys-worth-cisco-gear-242 https:\/\/searchnetworking.techtarget.com\/tip\/Protecting-your-border-routers https:\/\/www.cymru.com\/Documents\/secure-ios-template.html https:\/\/insights.sei.cmu.edu\/sei_blog\/2017\/05\/best-practices-for-network-border-protection.html https:\/\/community.cisco.com\/t5\/routing\/acl-on-border-router\/td-p\/1348932 https:\/\/community.cisco.com\/t5\/routing\/border-router-acl-and-good-practices\/td-p\/477743 &nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[29,30,31,25,16,19,6],"tags":[34,105],"class_list":["post-1290","post","type-post","status-publish","format-standard","hentry","category-ccie-rs","category-ccna","category-ccnp-route","category-cisco","category-courses","category-issues","category-networking","tag-acl","tag-security"],"_links":{"self":[{"href":"https:\/\/kb.lagonet.vn\/index.php?rest_route=\/wp\/v2\/posts\/1290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.lagonet.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kb.lagonet.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kb.lagonet.vn\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kb.lagonet.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1290"}],"version-history":[{"count":0,"href":"https:\/\/kb.lagonet.vn\/index.php?rest_route=\/wp\/v2\/posts\/1290\/revisions"}],"wp:attachment":[{"href":"https:\/\/kb.lagonet.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kb.lagonet.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kb.lagonet.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}