Book VI

Network Security

Contents at a Glance

Chapter 1: Network Security Basics

Network Zoning

Recognizing Security Risks

Introducing Security Risk Mitigation Methods

Chapter 2: Introducing IP Access Lists (IP ACLs)

The Purpose of Access Lists

Types of ACLs

Managing ACLs — Best Practices

Creating ACLs

Managing, Verifying, and Troubleshooting ACLs

Chapter 3: Introducing Network Address Translation (NAT)

Purpose of NAT

Operational Flow of NAT

Configuring NAT

Managing NAT

Chapter 4: Introducing Virtual Private Networks (VPNs)

Purpose of VPNs

Type of VPNs

Choosing a VPN Implementation Method

Creating and Managing IPsec VPNs

Get CCNA Certification All-In-One For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.