Summary
Now that you have completed this chapter, you should a have a firm understanding of the following concepts:
  • Controlling physical devices at all layers with the use of passwords, logins and privilege levels to allow for a more granular set of rights for network administrators
  • Prevent unauthorized access to your network through the use of port security
  • Controlling access at the Distribution Layer involves the use of access control lists in a variety of ways including route distribution, traffic management at the interface, and virtual terminal management.