11.1 Flashcards
What’s outside the net work has never been trusted but now what’s inside the net work also can’t be trusted this is called the – – – – – – Security model where everything in the network is considered untrustworthy until proven otherwise
Zero trust
Network devices such as ——————— are designed to pass traffic through the net work as quickly and efficiently as possible
Routers and switches
The last decision is called the – – – – – rule which insurance any traffic the ACL does not explicitly permit is deny by default
Implicit deny
Thanks to a routers – – – – – – Routers can also declined to Ford certain packets depending on their contact
Access control list
On most routers each interface must be assigned a separate – – – – and different – – – – maybe associated with inbound and outbound traffic
ACL
The – – – – command is used to sign statement to an ACL on Cisco routers and similar routers the commandments identify the ACL and include a permit or deny argument
access-list
This refers to the decision making layer of connective network devices
Control plane
An adoption of quality of service filters can be used to rate limit traffic on the control plane and management plan of routers and switches using a feature called – – – – –
Control plane policing or COPP
The – – – – command entered and team app configuration mode will pair of the class map created earlier it to your new policy map as follows
Class limit – I CMP
The – – – – – feature filters are a Messages so the messages can only come from specific interfaces on the switch. Additionally – – – – offers other criteria that can filter are iMessages on Valon interfaces according to source Mac or IP address
RA guard
Or a guard is configured on Cisco switches using Z – – – – – command
Raguard
A – – – – – – – running on a client device however could be used to implement and on Pass attack by configuring an attacker IP address is the victims computers default gateway
Rogue DHCP server
DHCP messages should be monitored by enabling – – – – – – on the
DHCP snooping
Like like like like like like can we can figure it on a switch to protect against our spoofing attacks
DAI or dynamic ARP inspection
 A – – – – – or proxy acts as an intermediary between the external and internal networks screening all incoming and outgoing traffic
Proxy server