Computer

Topics: IP address, Security, Computer security Pages: 66 (17984 words) Published: April 26, 2013
Cisco CCNA Security Notes (640-553)

Contents
Contents ....................................................................................................................................................... 1 Introduction .................................................................................................................................................. 3 Cisco Security Management Tools ........................................................................................................... 4 Control of Data ......................................................................................................................................... 4 Security Policy........................................................................................................................................... 5 Risk............................................................................................................................................................ 6 System Development Life Cycle (SDLC) .................................................................................................... 6 Understanding the Risks ............................................................................................................................... 7 Layer 2 risks .............................................................................................................................................. 8 Layer 3 risks .............................................................................................................................................. 9 Upper Layer risks .................................................................................................................................... 11 Physical ................................................................................................................................................... 12 Configuring Devices .................................................................................................................................... 13 Basic device Configuration ..................................................................................................................... 13 AAA ......................................................................................................................................................... 15 User Privileges ........................................................................................................................................ 17 Logon Security ........................................................................................................................................ 18 AutoSecure and One Step Lock Down .................................................................................................... 19 Logging.................................................................................................................................................... 21 NTP ......................................................................................................................................................... 22 Layer 2 security ........................................................................................................................................... 23 Port Security ........................................................................................................................................... 23 802.1x Port Security / Network Admission Control (NAC) ..................................................................... 24 Storm Control ......................................................................................................................................... 24 Span ports (Switchport Analyser) ........................................................................................................... 25 Securing VLANs...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Protect Your Computer Essay
  • computer Essay
  • Computer Essay
  • Ethical Computer Hacking Research Paper
  • Computer Fraud and Techniques Essay
  • Atlantic Computer Essay
  • Computer Security Incident Response Team Essay
  • Essay about How Computers Have Affected Society

Become a StudyMode Member

Sign Up - It's Free