Chapter 7. Network Security
Chapter Outline
7-2 Firewalls and Access Lists
Objectives
• Review denial of service attacks
• Introduce the procedures for configuring access lists
• Examine “best practice” for router security
• Examine “best practices” for switch security
• Examine the issues of wireless security
• Introduce the steps for configuring VPNs
Key Terms
Get A Practical Guide to Advanced Networking, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.