Overview
Explore the top 25 overlooked security configurations for switches and routers in this Black Hat USA 2001 conference talk. Delve into essential topics such as password management, community strings, encryption, source routing, subnet broadcast, and small services. Learn about filtering connections, config files, log review, private address space, and dynamic routing keys. Discover best practices for user accounts, ICMP redirects, port security, static ARP entries, and authentication. Examine SNMP, VPNs, common ports, proxy ARP, and IP layer security. Gain insights into rate limits, unicast reverse path verification, Cisco Discovery Protocol, Spanning Tree Protocol, and VRPC. Enhance your network security knowledge with this comprehensive overview of critical configuration considerations.
Syllabus
Introduction
The Basics
Passwords
Community Strings
Logging In and Using Encryption
Source Routing
Subnet Broadcast
Small Services
Filtering Connections
Config Files
Log Review
Private Address Space
Dynamic Routing Keys
Distribute List
User Accounts
ICMP Redirect
Port Security
Static ARP Entries
Authentication SNMP
VPNs
Common Port
Proxy ARP
IP Layer
Rate Limits
Verify Unicast Reverse Path
Cisco Discovery Protocol
Spanning Tree Protocol
Spanning Tree Root
Scheduler
VRP
Cisco
Taught by
Black Hat