Главная
Study mode:
on
1
Introduction
2
The Basics
3
Passwords
4
Community Strings
5
Logging In and Using Encryption
6
Source Routing
7
Subnet Broadcast
8
Small Services
9
Filtering Connections
10
Config Files
11
Log Review
12
Private Address Space
13
Dynamic Routing Keys
14
Distribute List
15
User Accounts
16
ICMP Redirect
17
Port Security
18
Static ARP Entries
19
Authentication SNMP
20
VPNs
21
Common Port
22
Proxy ARP
23
IP Layer
24
Rate Limits
25
Verify Unicast Reverse Path
26
Cisco Discovery Protocol
27
Spanning Tree Protocol
28
Spanning Tree Root
29
Scheduler
30
VRP
31
Cisco
Description:
Explore the top 25 overlooked security configurations for switches and routers in this Black Hat USA 2001 conference talk. Delve into essential topics such as password management, community strings, encryption, source routing, subnet broadcast, and small services. Learn about filtering connections, config files, log review, private address space, and dynamic routing keys. Discover best practices for user accounts, ICMP redirects, port security, static ARP entries, and authentication. Examine SNMP, VPNs, common ports, proxy ARP, and IP layer security. Gain insights into rate limits, unicast reverse path verification, Cisco Discovery Protocol, Spanning Tree Protocol, and VRPC. Enhance your network security knowledge with this comprehensive overview of critical configuration considerations.

Top 25 Overlooked Security Configurations on Your Switches and Routers

Black Hat
Add to list