Book Image

CCNA Security 210-260 Certification Guide

By : Glen D. Singh, Michael Vinod, Vijay Anandh
Book Image

CCNA Security 210-260 Certification Guide

By: Glen D. Singh, Michael Vinod, Vijay Anandh

Overview of this book

With CCNA Security certification, a network professional can demonstrate the skills required to develop security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. The CCNA Security 210-260 Certification Guide will help you grasp the fundamentals of network security and prepare you for the Cisco CCNA Security Certification exam. You’ll begin by getting a grip on the fundamentals of network security and exploring the different tools available. Then, you’ll see how to securely manage your network devices by implementing the AAA framework and configuring different management plane protocols. Next, you’ll learn about security on the data link layer by implementing various security toolkits. You’ll be introduced to various firewall technologies and will understand how to configure a zone-based firewall on a Cisco IOS device. You’ll configure a site-to-site VPN on a Cisco device and get familiar with different types of VPNs and configurations. Finally, you’ll delve into the concepts of IPS and endpoint security to secure your organization’s network infrastructure. By the end of this book, you’ll be ready to take the CCNA Security Exam (210-260).
Table of Contents (19 chapters)

What is a private VLAN?

Private VLAN is a security concept that is used primarily in data centers or server farms where multiple servers from different organizations are connected together.

There may be a situation where Team A may be placing two servers, Team B would be placing another two servers, and Team C has one server, all in the same physical data center space. Obviously, Team A would to isolate their network traffic from the other teams and vice verse. This would improve their security and privacy.

We may realize at this point that to fulfill this requirement, we can create three VLANs on the switch connected to the three teams' devices. And for communication purposes, each VLAN has to be associated with a subnet. But if instead of three, there a hundred VLAN requirements, we may need to accommodate a hundred subnets, which in most cases can cause a scalability issue...