O'Reilly logo

A Practical Guide to Advanced Networking, Third Edition by Jeffrey S. Beasley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Network Security

Chapter Outline

Introduction

7-1 Denial of Service

7-2 Firewalls and Access Lists

7-3 Router Security

7-4 Switch Security

7-5 Wireless Security

7-6 VPN Security

Summary

Questions and Problems

Objectives

• Review denial of service attacks

• Introduce the procedures for configuring access lists

• Examine “best practice” for router security

• Examine “best practices” for switch security

• Examine the issues of wireless security

• Introduce the steps for configuring VPNs

Key Terms

denial of service (DoS)

SYN attack

smurf attack

spoof

directed broadcast

hacked

distributed denial of service (DDoS) attack

firewall

access lists (ACL)

packet filtering

proxy server

stateful firewall

demilitarized zones

access lists

SMB

edge ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required