Now that you have completed this
chapter, you should a have a firm understanding of the following
concepts:
- Controlling physical devices at
all layers with the use of passwords, logins and privilege
levels to allow for a more granular set of rights for network
administrators
- Prevent unauthorized access to
your network through the use of port security
- Controlling access at the
Distribution Layer involves the use of access control lists in a
variety of ways including route distribution, traffic management
at the interface, and virtual terminal management.
|
|