Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide

You're reading from   Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide Begin a successful career in networking with CCNA 200-301 certification

Arrow left icon
Product type Paperback
Published in Nov 2020
Publisher Packt
ISBN-13 9781800208094
Length 764 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Glen D. Singh Glen D. Singh
Author Profile Icon Glen D. Singh
Glen D. Singh
Arrow right icon
View More author details
Toc

Table of Contents (26) Chapters Close

Preface 1. Section 1: Network Fundamentals
2. Chapter 1: Introduction to Networking FREE CHAPTER 3. Chapter 2: Getting Started with Cisco IOS Devices 4. Chapter 3: IP Addressing and Subnetting 5. Chapter 4: Detecting Physical Issues, Wireless Architectures, and Virtualization 6. Section 2: Network Access
7. Chapter 5: Implementing VLANs, Layer 2 Discovery Protocols, and EtherChannels 8. Chapter 6: Understanding and Configuring Spanning-Tree 9. Section 3: IP Connectivity
10. Chapter 7: Interpreting Routing Components 11. Chapter 8: Understanding First Hop Redundancy, Static and Dynamic Routing 12. Section 4: IP Services
13. Chapter 9: Configuring Network Address Translation (NAT) 14. Chapter 10: Implementing Network Services and IP Operations 15. Section 5: Security Fundamentals
16. Chapter 11: Exploring Network Security 17. Chapter 12: Configuring Device Access Control and VPNs 18. Chapter 13: Implementing Access Control Lists 19. Chapter 14: Implementing Layer 2 and Wireless Security 20. Section 6: Automation and Programmability
21. Chapter 15: Network Automation and Programmability Techniques 22. Chapter 16: Mock Exam 1
23. Chapter 17: Mock Exam 2
24. Assessments 25. Other Books You May Enjoy

Device access control

We are always excited to configure our networking devices so that we can forward traffic efficiently either on a local network or between subnets. It's always a fascinating experience to design an efficient and robust network for your organization or customer. However, our networking devices have important and confidential information being stored on them, such as the device's configurations, routing protocol, and network routers; MAC addresses; and even Syslog information. If an attacker or unauthorized person is able to successfully access your network devices, that person can perform a lot of malicious actions, such as reconfiguring your network routes to forward traffic to another path, erasing the Cisco IOS image and device's configurations, adjusting Spanning-Tree paths, and so on.

In this section, we will focus on securing physical, remote, and administrative access to your Cisco devices.

Securing console access

When you acquire...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image