YoVDO

Top 25 Overlooked Security Configurations on Your Switches and Routers

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Network Security Courses VPN Courses Encryption Courses Router Configuration Courses

Course Description

Overview

Explore the top 25 overlooked security configurations for switches and routers in this Black Hat USA 2001 conference talk. Delve into essential topics such as password management, community strings, encryption, source routing, subnet broadcast, and small services. Learn about filtering connections, config files, log review, private address space, and dynamic routing keys. Discover best practices for user accounts, ICMP redirects, port security, static ARP entries, and authentication. Examine SNMP, VPNs, common ports, proxy ARP, and IP layer security. Gain insights into rate limits, unicast reverse path verification, Cisco Discovery Protocol, Spanning Tree Protocol, and VRPC. Enhance your network security knowledge with this comprehensive overview of critical configuration considerations.

Syllabus

Introduction
The Basics
Passwords
Community Strings
Logging In and Using Encryption
Source Routing
Subnet Broadcast
Small Services
Filtering Connections
Config Files
Log Review
Private Address Space
Dynamic Routing Keys
Distribute List
User Accounts
ICMP Redirect
Port Security
Static ARP Entries
Authentication SNMP
VPNs
Common Port
Proxy ARP
IP Layer
Rate Limits
Verify Unicast Reverse Path
Cisco Discovery Protocol
Spanning Tree Protocol
Spanning Tree Root
Scheduler
VRP
Cisco


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube