Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

You're reading from  Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

Product type Book
Published in Nov 2020
Publisher Packt
ISBN-13 9781800208094
Pages 764 pages
Edition 1st Edition
Languages
Author (1):
Glen D. Singh Glen D. Singh
Profile icon Glen D. Singh

Table of Contents (26) Chapters

Preface 1. Section 1: Network Fundamentals
2. Chapter 1: Introduction to Networking 3. Chapter 2: Getting Started with Cisco IOS Devices 4. Chapter 3: IP Addressing and Subnetting 5. Chapter 4: Detecting Physical Issues, Wireless Architectures, and Virtualization 6. Section 2: Network Access
7. Chapter 5: Implementing VLANs, Layer 2 Discovery Protocols, and EtherChannels 8. Chapter 6: Understanding and Configuring Spanning-Tree 9. Section 3: IP Connectivity
10. Chapter 7: Interpreting Routing Components 11. Chapter 8: Understanding First Hop Redundancy, Static and Dynamic Routing 12. Section 4: IP Services
13. Chapter 9: Configuring Network Address Translation (NAT) 14. Chapter 10: Implementing Network Services and IP Operations 15. Section 5: Security Fundamentals
16. Chapter 11: Exploring Network Security 17. Chapter 12: Configuring Device Access Control and VPNs 18. Chapter 13: Implementing Access Control Lists 19. Chapter 14: Implementing Layer 2 and Wireless Security 20. Section 6: Automation and Programmability
21. Chapter 15: Network Automation and Programmability Techniques 22. Chapter 16: Mock Exam 1
23. Chapter 17: Mock Exam 2
24. Assessments 25. Other Books You May Enjoy

Device access control

We are always excited to configure our networking devices so that we can forward traffic efficiently either on a local network or between subnets. It's always a fascinating experience to design an efficient and robust network for your organization or customer. However, our networking devices have important and confidential information being stored on them, such as the device's configurations, routing protocol, and network routers; MAC addresses; and even Syslog information. If an attacker or unauthorized person is able to successfully access your network devices, that person can perform a lot of malicious actions, such as reconfiguring your network routes to forward traffic to another path, erasing the Cisco IOS image and device's configurations, adjusting Spanning-Tree paths, and so on.

In this section, we will focus on securing physical, remote, and administrative access to your Cisco devices.

Securing console access

When you acquire...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}