Chapter 9

Security

THE CCENT EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE THE FOLLOWING:

  • Identify security threats to a network and describe general methods to mitigate those threats
    • Explain today's increasing network security threats and the need to implement a comprehensive security policy to mitigate the threats
    • Explain general methods to mitigate common security threats to network devices, hosts, and applications
    • Describe the functions of common security appliances and applications
    • Describe security recommended practices including initial steps to secure network devices

images If you're a sys admin, my guess is that shielding sensitive, critical data, as well as your network's resources, from every possible evil exploit is a top priority of yours. Right? Good to know you're on the right page—Cisco has some really effective security solutions that will arm you with the tools you need to make this happen.

This chapter will cover both router and switch security. You'll learn how to configure and use Secure Shell (SSH) instead of Telnet to configure your routers in-band (meaning, through the network).

I'll start by providing you with an introduction to security, as well as the most common attacks on networks. Next, I'll give you the information you need to protect your routers and switches with passwords, SSH, and banners as well as implement port security on a switch (yes, some of this is a refresher from other chapters). Finally, I'll introduce you to virtual private networks (VPNs).

images For up-to-the minute updates for this chapter, please see www.lammle.com/forum and/or www.sybex.com/go/ccent2e.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.128.31.92