Which ones are immune to attack?
Which ones are immune to attack?When all it takes to STOP an attack is the simple removal of an RJ-45 connector from a router in a rack? (This begs the question: How is the beginning of an attack recognized? This also overlooks how rules are implemented in routers providing service from access points to 'the cloud' serve to limit what IP addys are allowed access to private physical networks.)
You ppl make any sort of defense or active countermeasures sound impossible ... (notwithstanding the use of VPNs, private physical networks et al)
Don't you ppl subscribe to anything like Network World or pay attention to what vendors offer in the way of routers and traffic screening/filtering? Don't make the mistake of projecting your network practices onto others in the real world ...