Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

You're reading from  Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

Product type Book
Published in Nov 2020
Publisher Packt
ISBN-13 9781800208094
Pages 764 pages
Edition 1st Edition
Languages
Author (1):
Glen D. Singh Glen D. Singh
Profile icon Glen D. Singh

Table of Contents (26) Chapters

Preface 1. Section 1: Network Fundamentals
2. Chapter 1: Introduction to Networking 3. Chapter 2: Getting Started with Cisco IOS Devices 4. Chapter 3: IP Addressing and Subnetting 5. Chapter 4: Detecting Physical Issues, Wireless Architectures, and Virtualization 6. Section 2: Network Access
7. Chapter 5: Implementing VLANs, Layer 2 Discovery Protocols, and EtherChannels 8. Chapter 6: Understanding and Configuring Spanning-Tree 9. Section 3: IP Connectivity
10. Chapter 7: Interpreting Routing Components 11. Chapter 8: Understanding First Hop Redundancy, Static and Dynamic Routing 12. Section 4: IP Services
13. Chapter 9: Configuring Network Address Translation (NAT) 14. Chapter 10: Implementing Network Services and IP Operations 15. Section 5: Security Fundamentals
16. Chapter 11: Exploring Network Security 17. Chapter 12: Configuring Device Access Control and VPNs 18. Chapter 13: Implementing Access Control Lists 19. Chapter 14: Implementing Layer 2 and Wireless Security 20. Section 6: Automation and Programmability
21. Chapter 15: Network Automation and Programmability Techniques 22. Chapter 16: Mock Exam 1
23. Chapter 17: Mock Exam 2
24. Assessments 25. Other Books You May Enjoy

Protecting against Layer 2 threats

Quite often, many organizations think cyber threats and attacks originate from outside of their organization, such as the internet. However, some of these threats and attacks can occur from within. These threats can be in the form of an innocent employee connecting an unauthorized device to the network, such as a switch or even a wireless router, or a disgruntled employee who wants to take down the company's network infrastructure for personal reasons. Your responsibility as a network engineer is not only to design and build networks for connectivity but also to ensure the security of the network.

In this section, you will learn how to implement security controls on your switches to prevent various Layer 2 attacks such as those mentioned in the previous sections.

Port security

Sometimes, when implementing a newly configured switch on a production network, the network engineer may honestly forget to secure any unused interfaces/ports...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}