{"id":75,"date":"2013-04-28T22:56:38","date_gmt":"2013-04-28T22:56:38","guid":{"rendered":"https:\/\/learncisco.net\/index.php\/securing-the-network\/"},"modified":"2023-01-11T09:00:58","modified_gmt":"2023-01-11T02:00:58","slug":"securing-the-network","status":"publish","type":"page","link":"https:\/\/www.learncisco.net\/courses\/icnd-1\/medium-size-switched-network-construction\/securing-the-network.html","title":{"rendered":"Securing the Network"},"content":{"rendered":"

In this lesson we would talk about some of the security concerns regarding more than their network switches and what we can do to minimize the risk of our network from being compromised. We will learn some of the basic security features that we can implement to secure our Cisco network environment.<\/p>\n

Overview of Switch Security<\/h2>\n

Many organizations erect firewall and sophisticated edge devices to stop security attacks from the outside world. Routers and switches that are internal to the organization have minimal-security configuration because they are designated to accommodate communications within the campus network.<\/p>\n

These days, many employees are given notebook so that they can work from the home or in the office. But, with this mobility comes a very serious threat, because the user’s home may not have the level of security protection as of that in the organization. The home users may get infected with viruses and Trojan horse programs, which they would then bring back to the office when they come into work. Because the viruses and Trojan horses are emanating from inside the network, the edge devices will not be able to stop this internal chaos. As such, we need to implement the necessary security features on the switches and internal routers to guard against potential malicious attacks from within the organization.<\/p>\n

Recommended Practices<\/h2>\n