Chapter 6. Securing Layer 2 Devices
This chapter covers the following topics:
Defending against Layer 2 attacks: This section explains how Cisco Catalyst switches can be configured to mitigate several common Layer 2 attacks.
Cisco Identity-Based Networking Services: This section examines how Cisco Identity-Based Networking Services (IBNS) uses IEEE 802.1x, RADIUS, and Extensible Authentication Protocol (EAP) technologies to selectively allow access to network resources, based on user credentials.
The characteristics of Layer 2 LAN devices frequently make these devices attractive targets for attackers. If an attacker can compromise Layer 2, he has access to the upper layers. This chapter explores these Layer 2 ...
Get CCNA Security Official Exam Certification Guide (Exam 640-553) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.