Secure Network Administration Principles
To keep the network safe, there are a number of basic principles that you can apply. This section looks at a number of these, many of which have been discussed in passing in previous chapters since nothing exists as a silo. The topics include rule-based management, port security, working with 802.1X, flood guards, loop protection, preventing network bridging, and log analysis.
Rule-based management, also known as label-based management, defines conditions for access to objects. The access is granted to the object based on both the object’s sensitivity label and the user’s sensitivity label. Most software packages that allow you to implement rule-based management divide correlation ...