1.0 Network Security


1.2 Given a scenario, use secure network administration principles.

  • Rule-based management


  • Firewall rules


  • VLAN management


  • Secure router configuration


  • Access control lists

    In computer security, an access control list (ACL) is a list of permissions attached to an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object.


  • Port Security


  • 802.1x


  • Flood guards


  • Loop protection


  • Implicit deny


  • Network separation


  • Log analysis


  • Unified threat management


Recommended

 





Associates