• Point - To - point protocol (ppp)Point - To - point protocol (ppp)

    PPP authentication PAP 2 way handshake CHAP 3 way handshake Use debug ppp authentication to confirm authentication configuration PPP configuration Done on a serial interface After PPP configuration, use show interfaces command to display: LCP state NCP state

    ppt28 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 7 | Lượt tải: 0

  • Configure a switchConfigure a switch

    CISCO IOS CLI includes the following features Built in help Command history/options Switch security Password protection Use of SSH for remote access Port security

    ppt29 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 5 | Lượt tải: 0

  • Living in a network centric worldLiving in a network centric world

    Describe basic measures to secure data networks Ensure confidentiality through use of User authentication Data encryption Maintain communication integrity through use of Digital signatures Ensure availability through use of Firewalls Redundant network architecture Hardware without a single point of failure

    ppt22 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 5 | Lượt tải: 0

  • Quản trị mạng - Services in a converged wanQuản trị mạng - Services in a converged wan

    Cisco Enterprise Architecture This is an expansion of the hierarchical model that further divides the enterprise network into Physical areas Logical areas Functional areas Selecting the appropriate WAN technology requires considering some of the following: WAN’s purpose Geographic scope of WAN Traffic requirements If WAN uses a public or ...

    ppt18 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 5 | Lượt tải: 0

  • Quản trị mạng - Implementing the cisco adaptive security appliance (asa)Quản trị mạng - Implementing the cisco adaptive security appliance (asa)

    The management interface depends on the model of ASA: – Cisco ASA 5505 - The management switch port can be any port, except for Ethernet 0/0. – Cisco ASA 5510 and higher - The interface to connect is Management 0/0

    pdf50 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 7 | Lượt tải: 0

  • Quản trị mạng - Chapter 9: Managing a secure networkQuản trị mạng - Chapter 9: Managing a secure network

    The security policy is an integral component of an organization’s network security design and implementation. It answers questions about what assets are to be protected and how to protect them. • A security policy typically consists of a goverming policy, a technical policy, and an end-user policy. • Standards, guidelines, and procedures cont...

    pdf82 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 5 | Lượt tải: 0

  • Quản trị mạng - Chapter 8: Implementing virtual private networksQuản trị mạng - Chapter 8: Implementing virtual private networks

    Describe the purpose and operation of VPN types • Describe the purpose and operation of GRE VPNs • Describe the components and operations of IPsec VPNs • Configure and verify a site-to-site IPsec VPN with preshared key authentication using CLI • Configure and verify a site-to-site IPsec VPN with preshared key authentication using CCP • Configu...

    pdf124 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 19 | Lượt tải: 0

  • Quản trị mạng - Chapter 7: Cryptographic systemsQuản trị mạng - Chapter 7: Cryptographic systems

    To authenticate each other, users have to obtain the certificate of the CA and their own certificate. These steps require the out-of-band verification of the processes. Public-key systems use asymmetric keys whe one is public and the other one is private. Key management is simplified because two users can freely exchange the certificates. Th...

    pdf104 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 19 | Lượt tải: 0

  • Quản trị mạng - Chapter 6: Securing the local area networkQuản trị mạng - Chapter 6: Securing the local area network

    Modern enterprise networks deploy wireless, VoIP, and SAN devices that require specialized security solutions. • Wireless technologies are the most prone to network attacks. A number of technologies have evolved to miligate these attacks. • With the increased adoption of VoIP, serveral security considerations specific to VoIP technology have ...

    pdf143 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 18 | Lượt tải: 0

  • Quản trị mạng - Chapter 5: Implementing intrusion preventionQuản trị mạng - Chapter 5: Implementing intrusion prevention

    Signatures may need to be tuned to a specifc netwok. • Continuously monitor an IPS solution to ensure that it is providing an adequate level of protection. • Implement Cisco IOS IPS using CLI or SDM • Modify IPS signatures using CLI or SDM • Use various CLI commends to verify and monitor a Cisco IOS IPS configuration. Học việ

    pdf83 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 26 | Lượt tải: 0