14.3. Wrap Up

In this chapter, we discussed the need for network security. In order to have a secure network and a viable security policy, all areas of the LAN must be considered and protected. There are some very real threats in Layer 2 environments, and those were outlined and discussed.

Securing the access to data equipment is important. Ensuring only those who need to have access is a big step in preventing security lapses. Requiring logins (and changing them regularly) is a must. Authentications and encryption policies are the norm. Network management and monitoring policies are required. Securing the perimeter of the network and securing the flow of data from point to point is a necessity.

In the Layer 2 catenet, always make sure that any unused ports are disabled until they are needed. This is a practice that you should ensure is a habit if you are in control of the network design. Additionally, never use the default VLAN for user groups. Doing so is just leaving your LAN open to a slew of issues (both security-related and otherwise).

Company information is valuable. The data that is passed from node to node belongs to the company and if used for intentions that are not honorable, the leaking of the data could cost monetary losses as well as legal concerns. Security practices are in place not only to prevent financial burdens, but also to ensure the company is following any and all legal requirements that are outlined for it.

Get The All-New Switch Book: The Complete Guide to LAN Switching Technology, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.