Securing network devices like routers and switches is the first line of defense. Configurations include setting strong passwords, enabling SSH access, and using role-based CLI views.
Router(config)# line vty 0 4 Router(config-line)# password cisco Router(config-line)# login
Port Security prevents unauthorized access by limiting which MAC addresses can connect to a switch port. Violation modes include protect, restrict, and shutdown.
Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 2 Switch(config-if)# switchport port-security violation shutdown Switch(config-if)# switchport port-security mac-address sticky
ACLs are used to filter traffic based on IP addresses, protocols, or ports. Standard ACLs filter only by source IP, while Extended ACLs allow filtering by source, destination, and protocol.
Router(config)# access-list 10 permit 192.168.1.0 0.0.0.255 Router(config)# interface fa0/0 Router(config-if)# ip access-group 10 in
VPNs encrypt traffic over untrusted networks like the internet. Site-to-site VPNs use IPsec, while remote access VPNs commonly use SSL or IPsec with client software.
crypto isakmp policy 10 encr aes hash sha authentication pre-share group 2 lifetime 86400
Concept | Description |
---|---|
Device Security | Control access to network hardware through secure configurations |
Port Security | Limit access to switch ports using MAC filtering and violation actions |
ACLs | Filter traffic based on IP, protocol, and port rules |
VPNs | Encrypt and secure traffic over public networks |