CISCO of Network +Network Administration

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

Home Forums Network Administration CISCO of Network +

This topic contains 23 replies, has 16 voices, and was last updated by  cybermo 2 years ago.

Viewing 4 posts - 21 through 24 (of 24 total)
  • Author
  • #89792


    @echezona — Several aspects here

    1) Why are you asking about NAC? Is there something you are trying to prevent? When I secure a network I first try to classify all my data and resources (what am I trying to protect). NIST has some great documents on conducting a risk assessment but my point is first worry about what you are trying to protect and what from. That will help you decide on the how.

    2) The Cisco switching do offer some port security features that can be helpful.

    You could also compartmentalize your key resources by moving accounting servers on their own VLAN and so forth.

    3) If you are more concerned about new switches, make sure you upgrade your firmware per Cisco stable recommendations and don’t forget to secure the management plane by only using SSH/HTTPS to manage devices. Lock down access to management stations (you can reserve your workstation in DHCP if you want to lock down to you).

    4) If you are trying to better protect your endpoints, make sure hosts have AV installed, get patched and have appropriate AV policies. Symantec does also offer a NAC as well as Microsoft. Don’t forget the good a comprehensive group policy could do to also improve host security.



    Thank you smeek







Viewing 4 posts - 21 through 24 (of 24 total)

You must be logged in to reply to this topic.

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?