Chapter Summary

Network security should be applied to all seven layers of the OSI model; however, this chapter discussed network security from a Layer 2 (data link layer) perspective. Some basic rules to keep in mind when setting up a secure Layer 2 switch-based network include the following:

  • VLANs should be set up so that they clearly separate logical components of your network.

  • VLANs are based on the level of security each VLAN requires.

  • If any switch ports are not being used, these ports should be placed in a VLAN designed to collect these unused ports.

Using port security on your switch as a security mechanism provides a level of security because port security is based on permitted and denied MAC addresses. Because a MAC address is a hardware ...

Get LAN Switching first-step now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.