Join Greg Sowell for an in-depth discussion in this video Basic router security, part of Networking Foundations: Network Media (WANs).
- [Voiceover] Protecting network devices…is just as important as protecting servers and PCs.…Step one is securing a remote administration.…Administrators remotely connect to the network…equipment to fix issues.…Access should only be allowed via secure methods…like SSH for CLI or HTTPS…for browser-based administration.…Insecure or unused protocols…like Telnet and FTP should be disabled.…When logging into equipment,…a centralized authentication system…should be employed when possible.…
A centralized authentication server like RADIUS…allows for unique user names to be used by employees…and can also keep track of entered commmands.…Most devices have a login password retry limit…for each device, which should be employed when possible.…Only specific IP ranges should be allowed…to connect to devices from mode administration…and statistics gathering with simple…network management protocol.…Limiting admin access to specific subnets…and specifying an IP address range…for VP and administrators…will severely limit potential attack vectors.…
He discusses different WAN technologies and features such as speeds, spans, and price points—including inexpensive options such as VPN. He then covers switches (the devices that connect computers in your building) and routers (devices that control the transmission of network data). Along the way, Greg shows how to build private connections, implement free networking over the Internet, build switch networks, and overlay-routed networks. He'll also introduce different routing protocols, such as OPSF link-state routing and distance-vector routing with RIPv2, EIGRP, and BGP.
Note that this course maps to domains 1 and 2 of the Microsoft Technology Associate (MTA) Networking Fundamentals certification exam (98-366).
- Understanding the technology: from dial-up to VPNs
- Working with hubs, bridges, and switches
- Ensuring hardware redundancy
- Using switching types and MAC tables
- Preventing bridge loops with STP
- Routing with routing tables
- Using NAT
- Securing your switches and routers
- Setting up firewalls
- Working with different routing protocols: RIPv2, OSPF, EIGRP, and more
Skill Level Beginner
Networking Foundations: Network Media (LANs)with Greg Sowell1h 7m Intermediate
1. WAN Technologies
4. Routing Protocols
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.