O'Reilly logo

IBM b-type Data Center Networking: Design and Best Practices Introduction by Steven Tong, Sebastian Oglaza, Michal Holenia, Norman Bogard, Jon Tate

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security
In this chapter we delve into the security options available in the IBM b-type Ethernet product range, including the following options:
Console access
Port security
Spanning-tree security
VLAN
ACLs (Layer 2 and Layer 3 or Layer 4)
Anti-spoofing protection
Route authentication
Remote access security
7.1 Security in depth
As computing became more pervasive in society, the ability for computing equipment to be used for unauthorized purposes became an issue. Best practice today is to ensure that security is enabled at every tier of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required