Kinh doanh - Marketing
Kinh tế quản lý
Biểu mẫu - Văn bản
Tài chính - Ngân hàng
Công nghệ thông tin
Tiếng anh ngoại ngữ
Kĩ thuật công nghệ
Khoa học tự nhiên
Khoa học xã hội
Văn hóa nghệ thuật
Sức khỏe - Y tế
Văn bản luật
Nông Lâm Ngư
Kỹ năng mềm
Luận văn - Báo cáo
Giải trí - Thư giãn
Tài liệu phổ thông
Văn mẫu
Giới thiệu
Đăng ký
Đăng nhập
Tìm
Danh mục
Kinh doanh - Marketing
Kinh tế quản lý
Biểu mẫu - Văn bản
Tài chính - Ngân hàng
Công nghệ thông tin
Tiếng anh ngoại ngữ
Kĩ thuật công nghệ
Khoa học tự nhiên
Khoa học xã hội
Văn hóa nghệ thuật
Y tế sức khỏe
Văn bản luật
Nông lâm ngư
Kĩ năng mềm
Luận văn - Báo cáo
Giải trí - Thư giãn
Tài liệu phổ thông
Văn mẫu
Thông tin
Điều khoản sử dụng
Quy định bảo mật
Quy chế hoạt động
Chính sách bản quyền
Giới thiệu
Đăng ký
Đăng nhập
0
Trang chủ
Công Nghệ Thông Tin
An ninh - Bảo mật
Lecture CCNA security partner - Chapter 5: Securing the Data Plane on Cisco Catalyst Switches
Đang chuẩn bị liên kết để tải về tài liệu:
Lecture CCNA security partner - Chapter 5: Securing the Data Plane on Cisco Catalyst Switches
Quang Minh
94
36
pptx
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Topics covered in this chapter include the following: An introduction to fundamental switching concepts, starting with the building blocks of VLANs and trunking; an introduction to other building blocks of switching technology, including Spanning Tree Protocol for high availability; a revisit and further explanation of security threats that exploit vulnerabilities in the switching infrastructure;. | Securing the Data Plane on Cisco Catalyst Switches 1 Contents Topics covered in this chapter include the following: • An introduction to fundamental switching concepts, starting with the building blocks of VLANs and trunking • An introduction to other building blocks of switching technology, including Spanning Tree Protocol for high availability • A revisit and further explanation of security threats that exploit vulnerabilities in the switching infrastructure • A description of how to plan and develop a strategy for protecting the data plane • A description of the Spanning Tree Protocol Toolkit found on Cisco IOS routers that prevents STP operations from having an impact on the security posture • A review of port security and how to configure it, to illustrate security controls that are aimed at mitigating MAC spoofing and other threats Overview Overview of VLANs and Trunking Trunking and 802.1Q 802.1Q Tagging DTP (Dynamic Trunking Protocol) Native VLANs Configuring VLANs and Trunks | Securing the Data Plane on Cisco Catalyst Switches 1 Contents Topics covered in this chapter include the following: • An introduction to fundamental switching concepts, starting with the building blocks of VLANs and trunking • An introduction to other building blocks of switching technology, including Spanning Tree Protocol for high availability • A revisit and further explanation of security threats that exploit vulnerabilities in the switching infrastructure • A description of how to plan and develop a strategy for protecting the data plane • A description of the Spanning Tree Protocol Toolkit found on Cisco IOS routers that prevents STP operations from having an impact on the security posture • A review of port security and how to configure it, to illustrate security controls that are aimed at mitigating MAC spoofing and other threats Overview Overview of VLANs and Trunking Trunking and 802.1Q 802.1Q Tagging DTP (Dynamic Trunking Protocol) Native VLANs Configuring VLANs and Trunks Configuring Inter-VLAN Routing Spanning Tree Overview STP 802.1D, RSTP, PVRST+ Mitigating Layer 2 Attacks 4 Domino Effect If Layer 2 is Compromised Layer 2 independence enables interoperability and interconnectivity. However, from a security perspective, Layer 2 independence creates a challenge because a compromise at one layer is not always known by the other layers. If the initial attack comes in at Layer 2, the rest of the network can be compromised in an instant. Network security is only as strong as the weakest link, and that link might be the data link layer Layer 2 Best Practices The following list suggests Layer 2 security best practices. All of these suggestions are dependent upon your security policy. • Manage switches in as secure a manner as possible (SSH, OOB, permit lists, and so on). • Whenever practical, declare the VLAN ID used on trunk ports with the switchport trunk allowed vlan command • Do not use VLAN 1 for anything. • Set all user ports to nontrunking (unless .
TÀI LIỆU LIÊN QUAN
Lecture CCNA security partner - Chapter 1: Network security concepts and policies
Lecture CCNA security partner - Chapter 2: Security strategy and Cisco borderless Network
Lecture CCNA security partner - Chapter 7: Planning a Threat Control Strategy
Lecture CCNA security partner - Chapter 3: Network Foundation Protection and Cisco Configuration Professional
Lecture CCNA security partner - Chapter 4: Securing the Management Plane on Cisco IOS Devices and AAA
Lecture CCNA security partner - Chapter 5: Securing the Data Plane on Cisco Catalyst Switches
Lecture CCNA security partner - Chapter 6: Securing the Data Plane in IPv6 Environments
Lecture CCNA security partner - Chapter 8: Access Control Lists for threat mitigation
Lecture CCNA security partner - Chapter 9: Firewall Fundamentals and Network Address Translation
Lecture CCNA security partner - Chapter 10: Cisco Firewalling Solutions Cisco IOS Zone-Based Firewall and Cisco ASA
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.