|
The need to control access to the network
increases as the number of applications used on the network increase
in both quantity and size. This chapter will focus on some of the
methods used to implement access control policy in the campus
network. We will first define the components of an access policy,
then discuss some of the methods of policy implementation for each
component.
Securing the campus network involves the
management of physical devices through passwords and access lists as
well as securing the physical access to the network through port
security. Traffic management control will be done through the use of
applied lists (applied to interfaces) and routing tables. This
chapter includes the following topics:
- Definition of an Access Policy
- Managing Network Devices
- Access Layer Policy
- Distribution Layer Policy
- Core Layer Policy
|
|