Chapter 11. Layer 2 Access Control

The demand for comprehensive network security has never been greater. Malicious users remain a threat; they steal, manipulate, and impede information, and they interrupt network services. Numerous solutions are available to address a network’s perimeter defense at the boundaries, but the greatest threat of information theft and unauthorized access remains within the internal network at the access level.

Organizations rely on networks to efficiently and securely manage who and what can access the network, and when, where, and how network access can occur. As threats of network service disruption by unauthorized access become more numerous, network reliability and security become more critical at each layer within ...

Get CCIE Professional Development Series Network Security Technologies and Solutions now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.