© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v3.08-1 Module Summary Key switch security issues should be identified on a switched network and.

Презентация:



Advertisements
Похожие презентации
© 2006 Cisco Systems, Inc. All rights reserved.SND v Module Summary To secure network access at Layer 2, follow these steps: –Protect administrative.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Minimizing Service Loss and Data Theft in a Campus Network Protecting Against Spoof Attacks.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Minimizing Service Loss and Data Theft in a Campus Network Preventing STP Forwarding Loops.
© 2006 Cisco Systems, Inc. All rights reserved.BCMSN v Module Summary A poorly designed network leads to large broadcast domains. Global configuration.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Minimizing Service Loss and Data Theft in a Campus Network Understanding Switch Security.
© 2006 Cisco Systems, Inc. All rights reserved.BCMSN v Module Summary STP protects the network from Layer 2 frames that might loop. Through the use.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Company ABC is unsecured and vulnerable to attack. There are many types of Layer.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Minimizing Service Loss and Data Theft in a Campus Network Securing Network Switches.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Module Summary An external router can be configured to route packets between the VLANs on.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Defining VLANs Implementing Best Practices for VLAN Topologies.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Module Summary Proper planning must take into account all aspects of network engineering.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Module Summary WLANs are shared networks that provide access to networks for multiple users.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Cisco Secure ACS can be used as AAA server to manage identity. Cisco IBNS uses.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Module Summary An IPsec VPN is a collection of protocols that help you to hook up your company.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Module Summary Traffic engineering measures, models, and controls traffic The MPLS TE uses.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Module Summary The Cisco SDN strategy offers a layered approach to providing integrated network.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Implementing Inter-VLAN Routing Enabling Routing Between VLANs on a Multilayer Switch.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Module Summary Attacks can target various components of modern networks, such as system integrity,
© 2006 Cisco Systems, Inc. All rights reserved.BCMSN v Defining VLANs Correcting Common VLAN Configuration Errors.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Minimizing Service Loss and Data Theft in a Campus Network Describing STP Security Mechanisms.
Транксрипт:

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Module Summary Key switch security issues should be identified on a switched network and proper measures taken to mitigate known attacks. VLAN trunk links should be secured to defend against VLAN hopping attacks. DHCP snooping, port security, and dynamic ARP inspection are used to protect the network against spoofing attacks. When placed into service, switches should be configured according to best practices to secure the switch device and its protocols from attacks that can be launched through a switch. UDLD and loop guard protect the network from anomalous STP conditions that result from unidirectional links. Implement AAA services to support port authentication using 802.1x.

© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v3.08-2