The document discusses strategies for securing networks, focusing on open source software options. It outlines three core areas that security consultants concentrate on: the perimeter or outer wall, mission-critical servers, and the internal user network. The first strategy discussed is protecting the perimeter with firewalls and network intrusion detection systems. Open source software provides many options for these security components and fulfilling firewall needs.