Chapter 5. Switching

Like routers, security precautions for switches are often overlooked. This is obviously a mistake. Switches serve as entry points to the network. Not only are they the handoff point from routers, they are also the way users connect into the core of your network.

Continuing the layered security model started in Chapter 4 with routers, switches are a second line of defense in network protection. As with routers, switch security needs to focus on stopping unwanted incoming and outgoing traffic. This means securing who has access to your switches, routing on multilayer switches, and restricting machine access to the switches.

In addition to access restriction, switches are used to help build a redundant, scalable, and highly ...

Get The Practice of Network Security: Deployment Strategies for Production Environments now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.