Top 25 Overlooked Security Configurations on Your Switches and Routers

Top 25 Overlooked Security Configurations on Your Switches and Routers

Black Hat via YouTube Direct link

Logging In and Using Encryption

5 of 31

5 of 31

Logging In and Using Encryption

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Top 25 Overlooked Security Configurations on Your Switches and Routers

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 The Basics
  3. 3 Passwords
  4. 4 Community Strings
  5. 5 Logging In and Using Encryption
  6. 6 Source Routing
  7. 7 Subnet Broadcast
  8. 8 Small Services
  9. 9 Filtering Connections
  10. 10 Config Files
  11. 11 Log Review
  12. 12 Private Address Space
  13. 13 Dynamic Routing Keys
  14. 14 Distribute List
  15. 15 User Accounts
  16. 16 ICMP Redirect
  17. 17 Port Security
  18. 18 Static ARP Entries
  19. 19 Authentication SNMP
  20. 20 VPNs
  21. 21 Common Port
  22. 22 Proxy ARP
  23. 23 IP Layer
  24. 24 Rate Limits
  25. 25 Verify Unicast Reverse Path
  26. 26 Cisco Discovery Protocol
  27. 27 Spanning Tree Protocol
  28. 28 Spanning Tree Root
  29. 29 Scheduler
  30. 30 VRP
  31. 31 Cisco

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.