Below is a sort of 'cheat sheet' on CCP in relation to the paths to take to get to certain areas. This is a must-know for the 640-554 exam. Enabling NAT: Configure -> Router -> NAT Verifying Current Access Lists Configure -> Router -> ACL -> ACL Summary Creating an access list Configure -> Router -> ACL -> ACL Editor…
Category Archives Networking
Securing layer 2 is an important fundamental aspect which must be covered as there are many different possible attack vectors in the layer 2 realm. Below I'll be detailing some of the more common attack vectors and how to mitigate them. Port Security Attack type: CAM/MAC table overflow Mitigation method: Port Security CAM overflow attacks are caused by a client…
This post will be the first of many detailing my CCNA Security Study Notes as I go. I've been somewhat slack and life events have arisen which has slowed my CCNA Security studies of late, however I'm going to be updating the site as I go with my study notes; Lets get to it! Network Security really dives deep with the…
At the time of this post, I had limited exposure to ASA 9.2 code and particularly using FQDN access-lists. Essentially what you can do is create an object with the Fully Defined Domain Name (FQDN) of a domain nested within. You can create multiple of these and place them inside a single object-group to keep things tidy (and you should!).…