Chapter 5. Securing the Data Plane on Cisco Catalyst Switches
In this chapter, you learn that, like routers, both Layer 2 and Layer 3 switches have their own set of network security requirements. Access to switches is a convenient entry point for attackers who are intent on illegally gaining access to a corporate network. With access to a switch, an attacker can set up rogue access points and protocol analyzers and launch all types of attacks from within the network. Attackers can even spoof the MAC and IP addresses of critical servers to do much damage. In this chapter, you will examine various Layer 2 attacks and strategies to mitigate them. Topics covered in this chapter include the following:
• An introduction to fundamental switching concepts, ...
Get Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.