Port security
Close unnecessary ports and services, configure ports based on mac addresses
Interface security
Change default passwords, disable unused interfaces, use NAC
NAC
Requires authentication to access network. MAC filtering
Key management system
Management of encryption keys. Create keys for services or users, log key usage, automatically rotate keys
ACL
Allow or disallow types of traffic based on IP, destination, port number, time, application, etc
Firewall rules
Goes from top to bottom, most specific to most general. Implicit deny if there’s no match
URL filtering
Filter URL from usage. Could use list
Content filtering
If content is detected, it’s filtered out. Parental control or malware filtering for ex
Screened subnet
Subnet only for public facing things, separate from internal network
Security zones
Zone based security tech, more flexible than IP address ranges. Trusted or untrusted, internal or external, types of devices