Chapter 3. Securing LAN and WLAN Devices

Many devices in today's networks operate at Layer 2. These devices are open to attacks that are inherent to Layer 2. It is imperative that security administrators understand how to control access, resist attacks, and guard other network devices and systems on the network.

Security Policies on Network Switches

Switches are targets, but often their security implications are overlooked. When protecting network switches, you need to provide the following protections:

  • Constrain Telnet access.
  • Set SNMP to read only.
  • Disable unneeded services.
  • Log unauthorized attempts.

In switches that deploy VLANs (which is the vast majority), you need to do the following:

  • Disable user ports from automatically trunking. ...

Get CCSP SND Quick Reference now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.