Vi ste ovdje
Overview/Description
The control plane in an Open Systems Interconnection (OSI) Layer 3 device provides traffic routing functions by building the device routing and forwarding tables. This often involves cooperation with nearby devices using dynamic routing protocols. These interactions must be controlled in multiple aspects by authenticating the associations between devices, discarding malicious routing information, and protecting the resources of each device against excessive use. This course examines a number of defenses in Cisco IOS Software that protect the control plane: infrastructure...
Overview/Description
In an Open Systems Interconnection (OSI) Layer 3 device, the data plane implements the packet forwarding functions and applies services to packets as they are forwarded through the device. The routed data plane can provide various OSI Layer 3 traffic filtering and traffic telemetry services to protect both the network infrastructure and the endpoints that are connected to the network. This course introduces some effective tools that you can use to provide such protection.
Target Audience
Network professionals responsible for securing and managing their network...
Overview/Description
Cisco IOS Software on Cisco Catalyst switches provides a host of data plane security controls that can mitigate the risks associated with Open Systems Interconnection (OSI) Layer 2 attacks inside a VLAN. This course shows you how to configure, verify, and troubleshoot several of the Cisco Catalyst IOS Software advanced security features that you can use to reduce these risks in your switched network environment.
Target Audience
Network professionals responsible for securing and managing their network infrastructures, who have CCNA certification, CCNA Security...
Overview/Description
The management plane performs all the management functions for a device and coordinates functions between the control and the data planes. These functions make the management plane a prime target for attacks. This course introduces you to some strategies for protecting the management plane by limiting access to it, limiting access to its individual features, and using role-based access control (RBAC). You can also configure security features of Simple Network Management Protocol version 3 (SNMPv3), use digitally signed software images, and configure the detection of...
Overview/Description
Deploying access control based on Open Systems Interconnection (OSI) Layer 3 and 4 parameters establishes a minimal connectivity policy for network applications. However, such filtering alone cannot provide protection to exposed applications, user awareness in dynamic environments, and control over access to specific types of content on the Internet. The Cisco IOS Zone-Based Policy Firewall provides advanced application layer (OSI Layer 5 to 7) filtering, user-based controls, and content filtering controls to address these scenarios when risk assessment demands them. This...
Overview/Description
One of the tools Cisco provides that allows you to centrally manage access to network resources is Cisco Secure Access Control Server (ACS). This course describes how to implement basic identity management services within a Cisco wired LAN by using Cisco Secure ACS and a Cisco Catalyst switch. It also discusses how to troubleshoot basic 802.1X features in a Cisco IBNS environment.
Target Audience
Network professionals responsible for securing and managing their network infrastructures, who have CCNA certification, CCNA Security certification (IINS), and a working...
Overview/Description
The Cisco IOS Zone-Based Policy Firewall represents the latest generation of Cisco IOS Software firewall functions. Designed as a replacement technology for Cisco IOS Classic firewalls, also known as Context-Based Access Control (CBAC) firewalls, Zone-Based Policy Firewalls change the firewall from the older interface-based model to a more easily understood zone-based model. In this course, you will learn to configure, verify, and troubleshoot Open Systems Interconnection (OSI) Layer 3 and 4 access control features of the Zone-Based Policy Firewall.
Target Audience...
Overview/Description
In modern IT infrastructures, it is becoming increasingly more important to protect company resources. Not only must company resources be defended passively, but also the protection must be constantly monitored and enhanced with systems that actively inspect the data that is passed over allowed and open connections. Intrusion prevention and intrusion detection systems are two technologies that can provide such risk reduction. This course covers the Cisco IOS Intrusion Prevention System (IPS). You will learn how to configure a Cisco router for intrusion prevention,...
Overview/Description
Dynamic Multipoint Virtual Private Networks (DMVPNs) are a Cisco IOS Software feature that simplifies the deployment of large hub-and-spoke, partially meshed, and fully meshed virtual private networks (VPNs). In this lesson, you will learn to integrate multipoint Generic Routing Encapsulation (mGRE) with Next Hop Resolution Protocol (NHRP) and IP Security (IPSec) to deploy DMVPN on hub-and-spoke devices. After configuring all required parameters, you will verify proper DMVPN operation and learn how to troubleshoot common DMVPN issues.
Target Audience
Network professionals...
Overview/Description
Cisco IOS Network Address Translation (NAT) and Port Address Translation (PAT) are mechanisms that you can use to conserve registered IP version 4 (IPv4) addresses in large networks, resolve overlapping addressing scenarios, and simplify IPv4 address management tasks. NAT and PAT translate IPv4 addresses within private internal networks to legal IPv4 addresses for transport over public external networks, such as the Internet, without requiring a registered subnet address. Incoming traffic is translated back for delivery within the inside network. This translation of IPv4...
- 1 od 2
- ››