Switches can be managed in many different ways. In this video, you’ll learn about unmanaged vs. managed switches, console connections, virtual terminals, in-band vs. out-of-band communication, and methods of authenticating administrators.
The foundation of access control is based on the three major tenants of identification, authentication, and authorization. In this video, you’ll learn how each of these is used to maintain the security of our networks.
Once your users login to the network, how do you assign rights and permissions? In this video, you’ll learn about access control and how implicit deny and time-of-day restrictions can be used to add additional access control security.