Interconnecting Cisco Networking Devices (CCENT), Part 3 of 4: Network Device Security
with expert Kenneth Mayer
Course description
Interconnecting Cisco Networking Devices Part 1 is the exam associated with the Cisco Certified Entry Network Technician (CCENT) certification or the first half of the Cisco Certified Network Associate Routing and Switching (CCNA Routing and Switching). Managing Network device security is important. This course will cover, passwords, securing administrative access, hardening devices, access control lists and traffic filtering.
Prerequisites
This is part 3 in the series.
Learning Paths
This course will help you prepare for the following certification and exam:
Interconnecting Cisco Networking Devices
100-105 ICND1: Interconnecting Cisco Networking Devices
Meet the expert
As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.
Course outline
Administrative Access and Device Hardening
Securing Administative Access (33:23)
- Introduction (00:10)
- Securing Administrative Access (02:51)
- Securing Remote Access (02:27)
- Service Password Encryption (00:58)
- Securing Physical Access (03:25)
- Securing VTY Lines (02:05)
- Using SSH (04:26)
- Verify SSH Configuration (01:51)
- Remote Access Reply (01:05)
- SSH (01:10)
- Encryption Process (02:40)
- Configuration Steps (02:16)
- Using ACL for Remote Access Security (02:22)
- Other Authentication Options (01:26)
- Using the Login Banner (01:59)
- Summary (01:56)
- Summary (00:08)
Implementing Device Hardening (47:02)
- Introduction (00:06)
- Implementing Device Hardening (01:30)
- How to Disable a Port (02:03)
- Port Security (03:09)
- How to Configure Port Security (03:34)
- Verify Port Security (01:58)
- Verify Port Security Continued (00:44)
- Turning off Unused Services (03:13)
- Turning off Unused Services Continued (01:06)
- NTP (02:34)
- How to Configure NTP (01:12)
- Verify NTP (01:15)
- AAA (04:47)
- Authentication (04:56)
- Authentication Continued (05:58)
- AAA Configuration (02:33)
- Authentication Servers (02:02)
- AAA Configuration Continued (02:59)
- Summary (01:05)
- Summary (00:08)
Traffic Filtering with ACLs
Implementing Traffic Filtering with ACLs (48:17)
- Introduction (00:09)
- Filtering Traffic with ACLs (00:40)
- How an Outbound ACL Functions (01:35)
- How to Apply an ACL to an Interface (03:49)
- Introducing the Extended ACL (02:20)
- Creating a Numbered Extended ACL (03:02)
- Using a Named ACL (04:49)
- Configuration Guidelines (01:24)
- Monitoring ACLs (01:29)
- Troubleshooting ACL Take 1 and 2 (02:40)
- Troubleshooting ACL Take 3 and 4 (03:48)
- Troubleshooting ACL Take 5 and 6 (02:58)
- Troubleshooting ACL Take 7 (02:07)
- Summary (01:17)
- Demo: Configure CLI (05:19)
- Demo: Sessions (05:00)
- Demo: Encrypt Passwords (05:35)
- Summary (00:08)
Traffic Filtering Demo Part 1 (53:17)
- Introduction (00:09)
- Demo: Enable SSH (05:20)
- Demo: Repeat SSH Enabling (03:35)
- Demo: Limit Remote Access (06:10)
- Demo: Add Login Banner (04:52)
- Demo: Banner of the Day (02:20)
- Demo: Shut Down Ports (06:33)
- Demo: Repeat Shut Down Ports (02:45)
- Demo: Port Security (05:47)
- Demo: Port Security Options (06:54)
- Demo: Disable Unused Services (05:37)
- Demo: NTP Connection (03:00)
- Summary (00:08)
Traffic Filtering Demo Part 2 (50:33)
- Introduction (00:09)
- Demo: Extended ACL (05:45)
- Demo: Troubleshoot ACL (05:50)
- Demo: SSH (04:25)
- Demo: Local User (05:20)
- Demo: NTP (04:40)
- Demo: Authenticate NTP (05:04)
- Demo: RADIUS (10:42)
- Demo: Locate DHCP Servers (04:18)
- Demo: Locate DHCP Servers Continued (04:07)
- Summary (00:08)