Chapter 12: Configuring Device Access Control and VPNs

A key topic within the field of Information Technology (IT) is ensuring secure configurations are always applied to our devices. Secure configurations help to ensure unauthorized persons are not granted access to a device due to a device's misconfiguration. Quite often, hackers can gain access to companies' perimeter devices such as routers and firewalls simply by guessing the required password, and at times, device administrators use default configurations and default user accounts. Sometimes, administrative access is not securely configured, and attackers are able to access devices and perform malicious actions. Ensuring secure access to networking devices should be a top priority for ...

Get Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.