© 2007 Cisco Systems, Inc. All rights reserved.SNRS v2.01-1 Module Summary Company ABC is unsecured and vulnerable to attack. There are many types of Layer.

Презентация:



Advertisements
Похожие презентации
© 2006 Cisco Systems, Inc. All rights reserved.SNRS v Layer 2 Security Examining Company ABC Unsecured.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Cisco NFP includes protection of the control, management, and data planes. CPPr.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Cisco Secure ACS can be used as AAA server to manage identity. Cisco IBNS uses.
© 2006 Cisco Systems, Inc. All rights reserved.SND v Module Summary To secure network access at Layer 2, follow these steps: –Protect administrative.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Adaptive Threat Defense Examining Company ABC Secured.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Layer 2 Security Configuring DHCP Snooping.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Module Summary Key switch security issues should be identified on a switched network and.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v Module Summary Serial point-to-point connections are used to connect your LAN and a service.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Layer 2 Security Examining Layer 2 Attacks.
© 2005 Cisco Systems, Inc. All rights reserved.SND v Module Summary Applying an effective security policy is the most important step that an organization.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v Module Summary Cisco provides several conceptual network models: IIN, SONA, and Cisco Enterprise.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary The Cisco IOS Firewall feature set combines existing Cisco IOS Firewall technology.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary IPsec is designed to provide interoperable, high-quality, cryptographically.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Module Summary The Cisco SDN strategy offers a layered approach to providing integrated network.
© 2006 Cisco Systems, Inc. All rights reserved.CIPT2 v Module Summary Cisco Unified CallManager provides several features to prevent toll fraud.
© 2005 Cisco Systems, Inc. All rights reserved. INTRO v Topologies.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Module Summary Cisco SONA is the enterprise framework for implementing intelligent networks.
© 2006 Cisco Systems, Inc. All rights reserved. BCMSN v Minimizing Service Loss and Data Theft in a Campus Network Protecting Against Spoof Attacks.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v Module Summary MPLS is a forwarding mechanism in which packets are forwarded based on labels.
© 2005 Cisco Systems, Inc. All rights reserved. CIT v Module Summary Use specific characteristics and commands to isolate failures of media, devices,
Транксрипт:

© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Module Summary Company ABC is unsecured and vulnerable to attack. There are many types of Layer 2 attacks including MAC spoofing, rogue DHCP servers, and VLAN hopping. Port security is used to mitigate several Layer 2 attacks. DHCP snooping is also used to mitigate certain Layer 2 attacks.

© 2007 Cisco Systems, Inc. All rights reserved.SNRS v2.01-2