Chapter 11. The Medium Network Implementation

Terms you'll need to understand:

  • Headend

  • Man-in-the-middle attack

  • Network topology discovery

  • Password attack

  • Trust exploitation

Techniques you'll need to master:

  • Performing a threat analysis for VPN services

  • Analyzing design alternatives

In this chapter, we do with the medium network what we did with the small network in the last chapter—look at it from these five points of view:

  • Assets to be protected

  • Threats to those assets

  • Devices used and their implementation and configuration

  • Threats mitigated

  • Design alternatives

In the case of the medium business network, however, we're talking about a larger and more complex edge, although the campus is the same architecturally (even if it has more hosts). The medium network ...

Get CSI Exam Cram™ 2 (Exam 642-541) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.