Chapter 15: Working with Cisco Security Solutions
Throughout the course of this chapter, you will learn how to implement various Cisco security solutions on a network to mitigate various types of threats and attacks. You will learn how to secure various Internet Protocol (IP) services and routing protocols, how to implement various Layer 2 security controls to prevent and mitigate Spanning Tree Protocol (STP), Dynamic Host Configuration Protocol (DHCP), and Man-in-the-Middle (MitM) attacks, and how to complement a Cisco firewall on a network.
In this chapter, we will cover the following topics:
- Implementing secure protocols on Cisco devices
- Deploying Layer 2 security controls
- Configuring a Cisco Adaptive Security Appliance (ASA) firewall
Let's dive in!