Chapter 5

1: Why is it imprudent to rely on VLANs to provide isolation and security?
A1: Answer: VLAN protocols are not written with security in mind. Additional measures need to be in place to ensure security.
2: What does port security do?
A2: Answer: Port security is a mechanism available on the Catalyst switches to restrict the MAC address that can connect via a particular port of the switch.
3: Which protocols are covered under IP permit lists?
A3: Answer: Telnet, SSH, HTTP, and SNMP.
4: What is an isolated VLAN port?
A4: Answer: An isolated port has complete Layer 2 separation from other ports within the same private VLAN, with the exception of the promiscuous port.
5: What is a promiscuous VLAN port?
A5: Answer: A promiscuous port is one that can ...

Get Network Security Principles and Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.