O'Reilly logo

CompTIA® Security+™: Study Guide, Fifth Edition by Emmett Dulaney

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Secure Network Administration Principles

To keep the network safe, there are a number of basic principles that you can apply. This section looks at a number of these, many of which have been discussed in passing in previous chapters since nothing exists as a silo. The topics include rule-based management, port security, working with 802.1X, flood guards, loop protection, preventing network bridging, and log analysis.

Rule-Based Management

Rule-based management, also known as label-based management, defines conditions for access to objects. The access is granted to the object based on both the object’s sensitivity label and the user’s sensitivity label. Most software packages that allow you to implement rule-based management divide correlation ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required