Chapter 7. Network Security

Chapter Outline

Introduction

7-1 Denial of Service

7-2 Firewalls and Access Lists

7-3 Router Security

7-4 Switch Security

7-5 Wireless Security

7-6 VPN Security

Summary

Questions and Problems

Objectives

• Review denial of service attacks

• Introduce the procedures for configuring access lists

• Examine “best practice” for router security

• Examine “best practices” for switch security

• Examine the issues of wireless security

• Introduce the steps for configuring VPNs

Key Terms

denial of service (DoS)

SYN attack

smurf attack

spoof

directed broadcast

hacked

distributed denial of service (DDoS) attack

firewall

access lists (ACL)

packet filtering

proxy server

stateful firewall

demilitarized zones

access lists

SMB

edge ...

Get A Practical Guide to Advanced Networking, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.