Layer 2 Security in Junos OS
This course is designed to help you recognize how attacks can come from within the network and what can be done to defend against such attacks when your network is running Juniper EX Series switches.
Attacks on a corporate network can have devastating consequences which can be attributed to not only the loss of potentially sensitive or valuable data, but also the damage to an organizations reputation. It is true that the edge where the enterprise network meets the public Internet needs to be protected against such attacks. However, some organizations neglect to spend as much time securing the inside of the network. This course, Layer 2 Security in Junos OS, is designed to help network engineers recognize how attacks can originate from within the network and more importantly, what can be done to defend against such attacks when your network is running Juniper EX Series switches. This course, along with the other courses in the JNCIS-ENT series, is designed to educate and prepare network engineers for working in and securing enterprise environments. First, you’ll learn about how attackers can utilize vulnerabilities in your network. Next you’ll explore what you can do to prevent such attacks. Finally, you’ll learn how you can control access to network resources from internal clients. By the end of this course, you’ll be able to understand some of the security threats that can be used against your Juniper EX Series switches and be confident that the solution you implement is the best solution in order to defeat that security threat.
Author Name: Martin Brown
Author Description:
Martin’s IT career goes back to 1993 and while he was involved with Apple Macintosh computers, and had the pleasure of using DEC VAX terminals. Back then, hand held literally meant picking the terminal up by it’s carry handle to move it to the other side of the desk and touch screen meant getting a static shock. Of course, the world has moved on a great deal since then and Martin is proud to be at the cutting edge of network and internetwork technology, working with devices from Cisco, F5, Chec… more
Table of Contents
- Course Overview
1min - Benefits and Operation of Layer 2 Security Features
33mins - Benefits and Operation of Layer 3 Security Features
28mins - Firewall Filters
25mins - Configuring and Monitoring Layer 2 Switch Security
44mins - Creating and Applying Firewall Filters
31mins - Layer 2 Security on Switches Running ELS
20mins
There are no reviews yet.