It is absolutely critical to ensure all your network devices are in place. Next, you must ensure those devices are configured according to set corporate policies. Here is where we study the application of network administration principles. This section will cover the following topics:
- Rule-based management
- Firewall rules
- VLAN management
- Secure router configuration
- Access control lists
- Port security
- 802.1X
- Flood guards
- Loop protection
- Implicit Deny
- Prevent network bridging by network separation
- Log analysis The content below this message is for members only.