Course Details

Previous Page


Cisco SWITCH 2.0: Campus Network Security I


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Layer 2 security implementation is often forgotten. However, you should take the basic security measures to guard against a host of attacks that can be launched at a switch and its ports. Two common security measures are implementing port security and port access lists. Network or host misconfigurations, host malfunctions, or intentional DoS attacks may flood the network with traffic storms. Cisco IOS switches provide the storm control feature to limit the impact of traffic storms and, if necessary, take appropriate actions. In this course you'll learn what a traffic storm is and how to control it, you'll also learn how to configure storm control and verify its behavior. In addition, this course will introduce the importance of switch security, and describe all the recommended practices for securing a switch. Lastly, you'll learn how to configure and verify simple port security, configure and verify port security by using sticky MAC address, what can cause ports to become error-disabled and how to recover from this state as well as how to define and configure port access lists. This course offers the official training for the Implementing Cisco IP Switched Networks 2.0 certification exam which is a component exam for the CCNP and CCDP certifications. Passing this exam will also refresh CCNA certification, which expires after three years

Target Audience
This course is intended for students who are looking for real-world switching knowledge, and those that are considering CCNP and CCDP certification. This course’s discussion of switching could also benefit early CCIE Routing and Switching candidates

Prerequisites
None

Expected Duration (hours)
2.0

Lesson Objectives

Cisco SWITCH 2.0: Campus Network Security I

  • start the course
  • describe the importance of switch access security
  • configure a secure password on a switch
  • recognize the recommended practices for using system banners
  • recognize the recommended practices for securing console access
  • recognize the recommended practices for securing VTY access
  • recognize the recommended practices for securing web access
  • recognize the recommended practices of using SSH instead of Telnet
  • recognize the recommended practices for securing SNMP access
  • recognize the recommended practices for securing STP
  • recognize the recommended practices for securing CDP
  • recognize the recommended practices for securing unused switch ports
  • describe how a rogue device gains unauthorized access to a network
  • describe the categories of switch attack types and list mitigation options
  • describe how port security is used to block input from devices based on Layer 2 restrictions
  • configure simple port security
  • verify simple port security
  • describe what can cause a port to become error-disabled and how to recover a port from the error-disabled state
  • define port access list
  • describe what a traffic storm is and how to control it
  • provide an example of configuring and verifying storm control and storm control behavior
  • configure switch port security
  • Course Number:
    cc_swch_a09_it_enus