Video description
Scanning news feeds from virtually any international news source reveals a never ending stream of sophisticated outsider attacks on corporate networks. While these attacks dominate the headlines, there is another form of network attack that is just as sinister: The insider attack on the enterprise LAN. In this video series, enterprise network security expert Martin Brown shows you how to recognize insider attacks and how to protect against them within a Juniper Network EX Series switch environment.
In addition to receiving the benefit of Brown's vast experience in identifying and counteracting Level 2 and Level 3 insider attacks, the course offers the unique opportunity to gain command-line Junos OS security configuration experience using real life Juniper EX Series hardware.
- Become aware of the sophisticated techniques insiders use to attack corporate LANs
- Master the methods used in Juniper switched networks to mitigate internal security threats
- Gain command-line Junos OS security configuration experience using real Juniper EX Series hardware
- Understand Layer 2 (Data Link) and Layer 3 (Network) attack types and mitigation methods
- Learn about security concepts such as storm control and directed broadcasts
- Explore the ways to secure the control plane to protect device management
Table of contents
-
Introduction
- Course Introduction 00:03:01
- About Me 00:01:39
-
Getting Started
- Overview Of Juniper Ex Series Switches 00:04:35
- Why Internal Security Is Necessary 00:05:22
- Introduction To Our Lab Environment 00:07:28
-
Layer 2
- Layer 2 Attacks Part - 1 00:08:27
- Layer 2 Attacks Part - 2 00:06:02
- Layer 2 Attacks Part - 3 00:04:52
- Persistent Mac Learning 00:04:50
- 802.1X Part - 1 00:06:44
- 802.1X Part - 2 00:04:17
- Mac Limiting 00:06:57
- Mac Move Limiting 00:06:15
- Storm Control 00:07:30
- VLAN Hoping Prevention 00:08:31
- Protecting The Spanning Tree Domain Part - 1 00:06:44
- Protecting The Spanning Tree Domain Part - 2 00:05:02
- Static Mac Address Secure Ports 00:03:32
- Troubleshooting Layer 2 Security 00:04:15
-
Layer 3
- Types Of Layer 3 Attack 00:09:11
- Dynamic ARP Inspection Part - 1 00:07:04
- Dynamic ARP Inspection Part - 2 00:06:27
- Dynamic ARP Inspection Part - 3 And IP Source Guard 00:06:26
- Trusted DHCP Servers Part - 1 00:08:39
- Trusted DHCP Servers Part - 2 00:04:31
- Directed Broadcasts 00:06:37
- Proxy ARP 00:07:56
- Securing Routing Protocols Part - 1 00:08:23
- Securing Routing Protocols Part - 2 00:05:01
-
Securing The Control Plane
- Control Plane Attacks 00:08:10
- Limiting Login Attempts 00:08:57
- Encrypting Session Data 00:07:10
- Firewall Filters Part - 1 00:09:18
- Firewall Filters Part - 2 00:08:13
- Firewall Filters Part - 3 00:05:34
- Policers And Rate Limiting Part - 1 00:08:04
- Policers And Rate Limiting Part - 2 00:04:09
-
Wrap-Up
- Where To Find More 00:02:25
- Conclusion 00:05:59
Product information
- Title: Securing Enterprise LANs Using the Junos OS
- Author(s):
- Release date: July 2016
- Publisher(s): Infinite Skills
- ISBN: 9781491962497
You might also like
video
Building Small Office Networks Using the Junos OS
In this Building Small Office Networks Using the Junos OS training course, expert author Martin Brown …
book
Network Maintenance and Troubleshooting Guide: Field-Tested Solutions for Everyday Problems, Second Editon
Network Maintenance and Troubleshooting Guide Field-Tested Solutions for Everyday Problems, Second Edition Neal Allen The 100% …
book
Network Administrator Street Smarts: A Real World Guide to CompTIA Network+® Skills, Second Edition
Develop the skills you need in the real world Hit the ground running with the street-smart …
video
CCNA Data Center DCICN 200-150
8+ Hours of Video Instruction More than eight hours of video instruction on configuration and troubleshooting …