Secure Network Administration Principles
To keep the network safe, there are a number of basic principles that you can apply. This section looks at a number of these, many of which have been discussed in passing in previous chapters since nothing exists as a silo. The topics include rule-based management, port security, working with 802.1X, flood guards, loop protection, preventing network bridging, and log analysis.
Rule-Based Management
Rule-based management, also known as label-based management, defines conditions for access to objects. The access is granted to the object based on both the object’s sensitivity label and the user’s sensitivity label. Most software packages that allow you to implement rule-based management divide correlation ...
Get CompTIA® Security+™: Study Guide, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.