Layer 2 Best Practices

Let’s begin with best practices for securing your switches and then discuss in more detail which best practice mitigates which type of attack.

Image

Best practices for securing your infrastructure, including Layer 2, include the following:

Image Select an unused VLAN (other than VLAN 1) and use that for the native VLAN for all your trunks. Do not use this native VLAN for any of your enabled access ports.

Image Avoid using VLAN 1 anywhere, ...

Get Santos:CCNA Sec 210-260 OCG now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.