Vi ste ovdje
ICND1 2.0: Managing Network Device Security
Overview/Description
When physical access has been enabled, you must secure access to the switch via the console port and the vty ports. You must also filter access to network devices from remote or internal locations.This course describes the steps that are required to secure local and remote access to network. It then goes on to describing the need for securing unused ports. It presents port security as a solution to the problem of maintaining control of utilized ports. The need to disable unused services is illustrated, and configuration examples show how to disable them. Why the correct system time is important and what can happen if the system time is not correct is explained. NTP is introduced, with a configuration example detailed. Once you understand how ACLs operate, you can implement them for an important network security mechanism: traffic filtering. Standard ACLs provide only limited traffic filtering. Extended ACLs can provide more precise traffic-filtering capabilities. This course also describes access-list configuration mode. This course enables you to define named ACLs, which are identified with descriptive names instead of numbers. The course also shows how to verify that ACLs are functioning properly and discusses some common configuration errors.
Target Audience
Interconnecting Cisco Network Devices Part 1 is essential for students preparing for the CCNA Routing and Switching or CCENT certifications. Students pursuing the CCNA Routing and Switching certification should complete parts 1 & 2 of the ICND learning path. Students pursuing the CCENT certification need only attend part 1 of the ICND curriculum. Anyone wishing to obtain Cisco Certified Network Associate (CCNA) 100-101 certification that validates the knowledge and skills required to successfully install, operate, and troubleshoot small to medium size enterprise branch network. Network administrators, network engineers, network managers, network designers, and project managers. Familiarity of navigating PC operating systems, the Internet, and basic IP addressing knowledge skills recommended.
Expected Duration (hours)
2.0
Lesson Objectivesdescribe how to secure access to the privileged EXEC mode
recognize how to secure console access to a network device
describe how to secure remote access to a network device
describe how to configure a switch so it can be accessed remotely
specify why external authentication should be used for larger networks
configure a login banner
describe the characteristics of port security
recognize how to configure and verify port security
identify best practices for disabling unused services
recognize how to configure and verify basic NTP
implement and configure port security on a switch in a given scenario
describe ACL operations
configure named ACLs in a given scenario
describe ACL configuration guidelines
monitor and verify ACLs in a given scenario
identify how to resolve common ACL configurations
configure filtering of management traffic with ACLs
troubleshoot ACLs
When physical access has been enabled, you must secure access to the switch via the console port and the vty ports. You must also filter access to network devices from remote or internal locations.This course describes the steps that are required to secure local and remote access to network. It then goes on to describing the need for securing unused ports. It presents port security as a solution to the problem of maintaining control of utilized ports. The need to disable unused services is illustrated, and configuration examples show how to disable them. Why the correct system time is important and what can happen if the system time is not correct is explained. NTP is introduced, with a configuration example detailed. Once you understand how ACLs operate, you can implement them for an important network security mechanism: traffic filtering. Standard ACLs provide only limited traffic filtering. Extended ACLs can provide more precise traffic-filtering capabilities. This course also describes access-list configuration mode. This course enables you to define named ACLs, which are identified with descriptive names instead of numbers. The course also shows how to verify that ACLs are functioning properly and discusses some common configuration errors.
Target Audience
Interconnecting Cisco Network Devices Part 1 is essential for students preparing for the CCNA Routing and Switching or CCENT certifications. Students pursuing the CCNA Routing and Switching certification should complete parts 1 & 2 of the ICND learning path. Students pursuing the CCENT certification need only attend part 1 of the ICND curriculum. Anyone wishing to obtain Cisco Certified Network Associate (CCNA) 100-101 certification that validates the knowledge and skills required to successfully install, operate, and troubleshoot small to medium size enterprise branch network. Network administrators, network engineers, network managers, network designers, and project managers. Familiarity of navigating PC operating systems, the Internet, and basic IP addressing knowledge skills recommended.
Expected Duration (hours)
2.0
Lesson Objectives
ICND1 2.0: Managing Network Device Security
Trajanje:
2 h
Šifra:
cc_icne_a10_it_enus
Katalog: