CCNA Security Notes - Managing a secure network

The security architecture consists of five main parts:
Scan Engine - This is the foundation for security and can be seen as an engine for strategy execution. They can be proxy or network devices for content inspection, identification, and user authentication. The scan engine can be a firewall/IPS, proxy, or a combination of both. The scanning engine can perform multi-layer anti-malicious feature protection, behavior analysis, and content detection.
Transport mechanisms - These mechanisms are introduced into the network through scanning elements. Includes traditional network devices, switches, or modules in routers or images in the Cisco Secure Network Cloud.
Security System (SIO) - distinguishes between secure traffic and malicious traffic. Cisco SIO monitors multiple terabytes of database traffic, thousands of servers in multiple data centers, and hundreds of engineers and technicians, with the sole purpose of identifying and blocking malicious traffic.
Policy Management Console - These consoles are separate from the enforced policy scans. By separating the execution and management of policies, the Cisco Secure X architecture can define a policy that covers multiple execution points, such as E-mail, even communication, and Web access.
Next-Generation Endpoints—Consumer products are impacting corporate networks that must automatically discover the closest scanning elements and seamlessly connect them in a virtual security architecture. The next generation terminal does not scan the content or run the feature file, but guarantees each connection of the endpoint.
Once the network is operational, it is important to find out its security status. There are a variety of predictions that can be used to determine the operating status of the system:
Network scanning
Vulnerability scanning
Password cracking
Log review
Integrity checkers
Virus detection
War dialing
War driving (22 or wireless LAN test)
Penetration testing
Namp is a low-level scanner that is easy to use and has some excellent features for network mapping and reconnaissance. The most basic Namp feature allows users to complete multiple tasks.
Typical TCP and UDP port scanning - looking for different services on a single host.
Typical TCP and UDP port sweeping - looking for the same service on multiple hosts.
Invisible TCP and UDP port scanning and sweeping - similar to typical scanning and sweeping, but harder to detect by the target host or IPS.
Remote operating system identification, called OS fingerprinting.

If you want to passed the exam successfully. you can review with ccie wireless 400 351 dumps from evedumps.com  that will help passed exam at first attempt. I will also recommend the ccnp wireless 300 360 exam  dumps too.

评论

热门博文