Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Top 25 Overlooked Security Configurations on Your Switches and Routers

Black Hat via YouTube

Overview

Explore the top 25 overlooked security configurations for switches and routers in this Black Hat USA 2001 conference talk. Delve into essential topics such as password management, community strings, encryption, source routing, subnet broadcast, and small services. Learn about filtering connections, config files, log review, private address space, and dynamic routing keys. Discover best practices for user accounts, ICMP redirects, port security, static ARP entries, and authentication. Examine SNMP, VPNs, common ports, proxy ARP, and IP layer security. Gain insights into rate limits, unicast reverse path verification, Cisco Discovery Protocol, Spanning Tree Protocol, and VRPC. Enhance your network security knowledge with this comprehensive overview of critical configuration considerations.

Syllabus

Introduction
The Basics
Passwords
Community Strings
Logging In and Using Encryption
Source Routing
Subnet Broadcast
Small Services
Filtering Connections
Config Files
Log Review
Private Address Space
Dynamic Routing Keys
Distribute List
User Accounts
ICMP Redirect
Port Security
Static ARP Entries
Authentication SNMP
VPNs
Common Port
Proxy ARP
IP Layer
Rate Limits
Verify Unicast Reverse Path
Cisco Discovery Protocol
Spanning Tree Protocol
Spanning Tree Root
Scheduler
VRP
Cisco

Taught by

Black Hat

Reviews

Start your review of Top 25 Overlooked Security Configurations on Your Switches and Routers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.