- Preventing Unauthorized Access
- Controlling Switch Access with Passwords and Privilege Levels
- Configuring TACACS+
- Configuring RADIUS
- Configuring Kerberos
- MACsec Encryption
- Configuring Local Authentication and Authorization
- Configuring Secure Shell (SSH)
- X.509v3 Certificates for SSH Authentication
- Configuring Secure Socket Layer HTTP
- Configuring IPv4 ACLs
- Configuring IPv6 ACLs
- Configuring DHCP
- Configuring IP Source Guard
- Configuring Dynamic ARP Inspection
- Configuring IPv6 First Hop Security
- Configuring SISF-Based Device Tracking
- Configuring IEEE 802.1x Port-Based Authentication
- Web-Based Authentication
- Configuring Port-Based Traffic Control
- Configuring Control Plane Policing
- Configuring Cisco TrustSec