Chapter 10: Security

Objectives:

Upon completion of this chapter, you will be able to perform tasks related to:

10.1 Access Lists
10.2 Securing Router Access
10.3 Dynamic access lists: lock-and-key
10.4 Session Filtering
10.5 Context-Based Access Control
10.6 Using an Alternative to Access Lists
10.7 Configuring Router Security Lab Exercises