Use a firewall to restrict access from the outside to the network devices, and use SSH or another encrypted and authenticated transport to access device configurations.
Physically secure the equipment.
A denial-of-service attack is a flood of packets requesting a TCP connection to a server.