11.5. Switching and Network Security

Security is becoming more critical to us every day, so just how do you stop people from simply plugging a host into one of your switch ports—or worse, adding a hub, switch, or access point into the Ethernet jack in their office? Remember that, by default, MAC addresses will just dynamically appear in your MAC forward/filter database. Here I describe how you can ensure port security, and how you can take control of each port to provide better security for your network resources.

11.5.1. Port Security/Authentication

Figure 11.17 illustrates how a host plugged into a switch can restrict port security by MAC address.

Figure 11.17. Port security

There are a few ways to ensure port security on your switches. ...

Get CompTIA Network+® Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.