Chapter 9: Security

Written Lab 9

  1. Denial of service
  2. transport input ssh
  3. Use a firewall to restrict access from the outside to the network devices, and use SSH or another encrypted and authenticated transport to access device configurations.
  4. Physically secure the equipment.
  5. A denial-of-service attack is a flood of packets requesting a TCP connection to a server.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.134.100.31