Constructing a Secure Infrastructure

Chapter 6 Securing Layer 2 Devices

Chapter 7 Implementing Endpoint Security

Chapter 8 Providing SAN Security

Chapter 9 Exploring Secure Voice Solutions

Chapter 10 Using Cisco IOS Firewalls to Defend the Network

Chapter 11 Using Cisco IOS IPS to Secure the Network

This chapter covers the following topics:

Defending against Layer 2 attacks: This section explains how Cisco Catalyst switches can be configured to mitigate several common Layer 2 attacks.

Cisco Identity-Based Networking Services:

This section examines how Cisco Identity-Based Networking Services (IBNS) uses IEEE 802.1x, RADIUS, and Extensible Authentication Protocol (EAP) technologies to selectively allow access to network resources, based on user credentials.

0 0

Post a comment