Chapter 7. Network Security

Chapter Outline

Introduction

7-1 Denial of Service

7-2 Firewalls and Access Lists

7-3 Router Security

7-4 Switch Security

7-5 Wireless Security

7-6 VPN Security

Summary

Questions and Problems

Objectives

• Review denial of service attacks

• Introduce the procedures for configuring access lists

• Examine “best practice” for router security

• Examine “best practices” for switch security

• Examine the issues of wireless security

• Introduce the steps for configuring VPNs

Key Terms

denial of service (DoS)

SYN attack

smurf attack

spoof

directed broadcast

hacked

distributed denial of service (DDoS) attack

firewall

access lists (ACL)

packet filtering

proxy server

stateful firewall

demilitarized zones

access lists

SMB

edge ...

Get A Practical Guide to Advanced Networking, Third Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.