Imate žicu za učenje?

ICND1 2.0: Managing Network Device Security

When physical access has been enabled, you must secure access to the switch via the console port and the vty ports. You must also filter access to network devices from remote or internal locations.This course describes the steps that are required to secure local and remote access to network. It then goes on to describing the need for securing unused ports. It presents port security as a solution to the problem of maintaining control of utilized ports. The need to disable unused services is illustrated, and configuration examples show how to disable them. Why the correct system time is important and what can happen if the system time is not correct is explained. NTP is introduced, with a configuration example detailed. Once you understand how ACLs operate, you can implement them for an important network security mechanism: traffic filtering. Standard ACLs provide only limited traffic filtering. Extended ACLs can provide more precise traffic-filtering capabilities. This course also describes access-list configuration mode. This course enables you to define named ACLs, which are identified with descriptive names instead of numbers. The course also shows how to verify that ACLs are functioning properly and discusses some common configuration errors.

Target Audience
Interconnecting Cisco Network Devices Part 1 is essential for students preparing for the CCNA Routing and Switching or CCENT certifications. Students pursuing the CCNA Routing and Switching certification should complete parts 1 & 2 of the ICND learning path. Students pursuing the CCENT certification need only attend part 1 of the ICND curriculum. Anyone wishing to obtain Cisco Certified Network Associate (CCNA) 100-101 certification that validates the knowledge and skills required to successfully install, operate, and troubleshoot small to medium size enterprise branch network. Network administrators, network engineers, network managers, network designers, and project managers. Familiarity of navigating PC operating systems, the Internet, and basic IP addressing knowledge skills recommended.

Expected Duration (hours)

Lesson Objectives

ICND1 2.0: Managing Network Device Security

  • describe how to secure access to the privileged EXEC mode
  • recognize how to secure console access to a network device
  • describe how to secure remote access to a network device
  • describe how to configure a switch so it can be accessed remotely
  • specify why external authentication should be used for larger networks
  • configure a login banner
  • describe the characteristics of port security
  • recognize how to configure and verify port security
  • identify best practices for disabling unused services
  • recognize how to configure and verify basic NTP
  • implement and configure port security on a switch in a given scenario
  • describe ACL operations
  • configure named ACLs in a given scenario
  • describe ACL configuration guidelines
  • monitor and verify ACLs in a given scenario
  • identify how to resolve common ACL configurations
  • configure filtering of management traffic with ACLs
  • troubleshoot ACLs
  • Trajanje: 
    2 h

    Koraci do učenja

    1Prijavi se

    Prijavite se, a ako nemate korisničko ime, registrirajte se.

    2Pronađi i upiši program

    Pronađite edukacijske programe u Katalogu i Certifikaciji, ili koristite polje za pretragu.


    Upisani programi dostupni su u meniju Korisnik, Moji tečajevi.

    »Detaljne upute

    Trenutno nema programa koji imaju objavljene termine.