© 2006 Cisco Systems, Inc. All rights reserved.SND v2.03-1 Module Summary To secure network access at Layer 2, follow these steps: –Protect administrative.

Презентация:



Advertisements
Похожие презентации
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Module Summary Key switch security issues should be identified on a switched network and.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Company ABC is unsecured and vulnerable to attack. There are many types of Layer.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing LAN and WLAN Devices Applying Security Policies to Network Switches.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Module Summary Serial point-to-point connections are used to connect your LAN and a service.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Cisco NFP includes protection of the control, management, and data planes. CPPr.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing LAN and WLAN Devices Mitigating Layer 2 Attacks.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Module Summary The Cisco SDN strategy offers a layered approach to providing integrated network.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Cisco Secure ACS can be used as AAA server to manage identity. Cisco IBNS uses.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Layer 2 Security Examining Layer 2 Attacks.
© 2005 Cisco Systems, Inc. All rights reserved.SND v Module Summary Applying an effective security policy is the most important step that an organization.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Module Summary WLANs are shared networks that provide access to networks for multiple users.
© 2006 Cisco Systems, Inc. All rights reserved.BCMSN v Module Summary STP protects the network from Layer 2 frames that might loop. Through the use.
© 2006 Cisco Systems, Inc. All rights reserved.SND v Module Summary Routers play an important role in ensuring that network perimeters are secure;
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Module Summary LAN switches and bridges have the ability to listen to traffic and make intelligent.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing LAN and WLAN Devices Using Cisco Catalyst Switch Security Features.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Security Design Review Define the security requirements. Define the security policy. Integrate.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Introduction to Network Security Policies Module Self-Check.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Working with Variables and Application Classes.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Securing the Perimeter Disabling Unused Cisco Router Network Services and Interfaces.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Minimizing Service Loss and Data Theft in a Campus Network Understanding Switch Security.
Транксрипт:

© 2006 Cisco Systems, Inc. All rights reserved.SND v Module Summary To secure network access at Layer 2, follow these steps: –Protect administrative access to the switch. –Protect the switch management port. –Turn off unused network services. –Lock down the ports. –Use Cisco Catalyst switch security features. VLAN hopping, STP manipulation, ARP spoofing, CAM table overflow, and MAC spoofing are the Layer 2 attacks used to compromise LANs. Port security used along with security best practices will mitigate against these attacks. Cisco Catalyst switch security features greatly reduce the chances of network attack. WLANs are secured by applying i mechanisms, which include 802.1x authentication.

© 2006 Cisco Systems, Inc. All rights reserved.SND v2.03-2