Chapter 14. Switch Security

IN THIS CHAPTER, YOU WILL LEARN HOW TO DO THE FOLLOWING:

  • Describe common Layer 2 network attacks (MAC flooding, rogue devices, VLAN hopping, DHCP spoofing, and more)

  • Explain and configure Port Security, 802.1x, VACLs, Private VLANs, DHCP snooping, and DAI

Over time much of the IT industry's attention has been focused on security attacks from outside the boundaries of the organization and/or the upper layers of the OSI. Security for the network too often focuses just on edge devices and being able to filter traffic using Layer 3 and Layer 4 information. Usually devices will scan the headers, ports, and do some stateful ...

Get Cisco® Network Professional's: Advanced Internetworking Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.