Securing Cisco Devices

1234567891011121314
Across
  1. 1. A networking feature that enhances the reliability and security of a Spanning Tree Protocol (STP) topology by protecting against unauthorized devices
  2. 3. Limiting access on switch ports.
  3. 5. It is a crucial component of both the public and private keys in RSA encryption and decryption processes.
  4. 8. A network protocol primarily used for centralized management of user access to network devices
  5. 10. ___________ data guard detects misconfigured fiber or switch connections
  6. 12. Securing trunk links between switches by only permitting specific vlans.
  7. 13. Enabling PortFast for secure switch operation.
  8. 14. Designated ports for DHCP Snooping.
Down
  1. 2. Preventing rogue DHCP servers (shortened form).
  2. 4. A network protocol that handles authentication, authorization, and accounting (AAA) for users and devices accessing a network
  3. 6. Filtering based on MAC addresses.
  4. 7. Dividing network into secure VLANs.
  5. 9. Using SSH for secure management.
  6. 11. Port security feature that retains learned MAC addresses on a switch port, even after the switch restarts or the link goes down
  7. 12. Securing ARP traffic with DHCP Snooping.