|
6.0 Network Device Security
- 6.1 Configure and verify network device security features
- 6.1.a Device password security
- 6.1.b Enable secret vs. enable
- 6.1.c Transport
- 6.1.c (i) Disable telnet
- 6.1.c (ii) SSH
- 6.1.d VTYs
- 6.1.e Physical security
- 6.1.f Service password
- 6.1.g Describe external authentication methods
- 6.2 Configure and verify switch port security
- 6.2.a Sticky mac
- 6.2.b MAC address limitation
- 6.2.c Static/dynamic
- 6.2.d Violation modes
- 6.2.d (i) Err disable
- 6.2.d (ii) Shutdown
- 6.2.d (iii) Protect restrict
- 6.2.e Shutdown unused ports
- 6.2.f Err disable recovery
- 6.2.g Assign unused ports in unused VLANs
- 6.2.h Putting Native VLAN to other than VLAN 1
- 6.3 Configure and verify ACLs to filter network traffic
- 6.4 Configure and verify ACLs to limit telnet and SSH access to the router
|
|
|