Join Greg Sowell for an in-depth discussion in this video Security options, part of Foundations of Networking: Network Media (WANs).
- View Offline
- [Voiceover] A layer three switch is simply a switch…that can perform routing functions.…The majority of mid to high end switches produced today…are considered layer three switches.…Even some of the layer two switches…can have their license updated…to allow for layer three functionality.…In essence, it is a switch that can also perform…routing functions.…Securing access to your devices,…be them layer two or three is important.…Securing the control plane is usually the first step.…The control plane is the back end engine of the device.…
Functions like STP, routing, and remote administration…are part of this control plane.…If the control plane of a device is overwhelmed,…network services can be disrupted.…Remote administration is the first service to evaluate.…Most devices have a multitude of administration techniques,…but secure methods should be employed when possible.…Some devices will have web based administration…for easy configuration through a browser.…If configuration must be done from a browser,…ensure that you have enabled HTTPS to encrypt the traffic.…
He discusses different WAN technologies and features such as speeds, spans, and price points—including inexpensive options such as VPN. He then covers switches (the devices that connect computers in your building) and routers (devices that control the transmission of network data). Along the way, Greg shows how to build private connections, implement free networking over the Internet, build switch networks, and overlay-routed networks. He'll also introduce different routing protocols, such as OPSF link-state routing and distance-vector routing with RIPv2, EIGRP, and BGP.
Note that this course maps to domains 1 and 2 of the Microsoft Technology Associate (MTA) Networking Fundamentals certification exam (98-366).
- Understanding the technology: from dial-up to VPNs
- Working with hubs, bridges, and switches
- Ensuring hardware redundancy
- Using switching types and MAC tables
- Preventing bridge loops with STP
- Routing with routing tables
- Using NAT
- Securing your switches and routers
- Setting up firewalls
- Working with different routing protocols: RIPv2, OSPF, EIGRP, and more