Chapter 11. Layer 2 Access Control
The demand for comprehensive network security has never been greater. Malicious users remain a threat; they steal, manipulate, and impede information, and they interrupt network services. Numerous solutions are available to address a network’s perimeter defense at the boundaries, but the greatest threat of information theft and unauthorized access remains within the internal network at the access level.
Organizations rely on networks to efficiently and securely manage who and what can access the network, and when, where, and how network access can occur. As threats of network service disruption by unauthorized access become more numerous, network reliability and security become more critical at each layer within ...
Get CCIE Professional Development Series Network Security Technologies and Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.