Chapter 8. Securing the Data Plane on Catalyst Switches
This chapter covers the following topics:
Common Threats to the Switching Infrastructure
• Configuring Optional Port Security Settings
• Configuring Port Security Example
Spanning Tree Protocol Attacks
• Configuring STP Enhancement Features
• Configuring STP Enhancements Example
• Configuring Storm Control Example
• Mitigating VLAN Attacks Example
Advanced Layer 2 Security Features
Get CCNA Security (640-554) Portable Command Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.