Book VI
Network Security
Book VI
Network Security
Contents at a Glance
Chapter 1: Network Security Basics
Network Zoning
Recognizing Security Risks
Introducing Security Risk Mitigation Methods
Chapter 2: Introducing IP Access Lists (IP ACLs)
The Purpose of Access Lists
Types of ACLs
Managing ACLs — Best Practices
Creating ACLs
Managing, Verifying, and Troubleshooting ACLs
Chapter 3: Introducing Network Address Translation (NAT)
Purpose of NAT
Operational Flow of NAT
Configuring NAT
Managing NAT
Chapter 4: Introducing Virtual Private Networks (VPNs)
Purpose of VPNs
Type of VPNs
Choosing a VPN Implementation Method
Creating and Managing IPsec VPNs
Get CCNA Certification All-In-One For Dummies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.
Get Mark Richards’s Software Architecture Patterns ebook to better understand how to design components—and how they should interact.
Dive in for free with a 10-day trial of the O’Reilly learning platform—then explore all the other resources our members count on to build skills and solve problems every day.
Start your free trial Become a member now