-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Python Web Development with Sanic
By :
Aspiring network professionals are usually excited to configure networking devices to forward traffic efficiently either on a local network or between subnets. It is always a fascinating experience to design an efficient and robust network for your organization or customer. However, your networking devices have important and confidential information, such as the device’s configurations, routing protocol and network routers, MAC addresses, and even syslog information, stored in them. If an attacker or an unauthorized person can successfully access your network devices, they can perform a lot of malicious actions, such as re-configuring your network routes to forward traffic to another path, accessing the Cisco IOS image and device’s configurations, and adjusting spanning tree paths.
In this section, you will focus on securing physical, remote, and administrative access to your Cisco devices.
When you acquire a new...