tailieunhanh - Security and Performance Management

This chapter focuses on methods that can be used to provide you with a secure network. The aim of this chapter is to familiarize you with common security options and performance management queuing methods. This chapter covers the following CCIE blueprint objectives as determined by the Cisco Systems CCIE program: | Security and Performance Management Terms you ll need to understand IP access control lists Authentication Authorization Accounting Remote Authentication Dial-In User Service RADIUS Terminal Access Controller Access Control System TACACS Private Internet Exchange PIX Firewalls Demilitarized zones DMZ Encryption Weighted Fair Queuing WFQ Priority queuing Custom queuing Techniques you ll need to master Describing why security and traffic filtering is important on Cisco routers Determining the proper placement of Access Control Lists to efficiently filter traffic Understanding the characteristics of AAA RADIUS and TACACS Knowing the queuing methods available on Cisco routers 1 2 Chapter 8 This chapter focuses on methods that can be used to provide you with a secure network. The aim of this chapter is to familiarize you with common security options and performance management queuing methods. This chapter covers the following CCIE blueprint objectives as determined by the Cisco Systems CCIE program AeczrvA Authentication Authorization and Accounting AAA Terminal Access Controller Access Control System TACACS RADIUS PIX firewalls demilitarized zones DMZ encryption public private keys Data Encryption Standard DES Access Lists Standard access lists and extended access lists to include where and how to place and design them Performance Management Traffic management queuing Weighted Fair Queuing WFQ Resource Reservation Protocol RSVP traffic shaping load balancing As with other chapters in this book additional information is provided for completeness and in preparation for additional subjects as the CCIE Program expands. Basic Network Security Network security is one of the primary concerns in today s networks. Many businesses must protect sensitive data from competitors or financial details from unauthorized personnel. A good security policy protects your network against corruption failure and compromised data. Cisco IOS provides a number of security features including the

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.