Chapter 6. Securing Layer 2 Devices

<feature><title></title>

This chapter covers the following topics:

  • Defending against Layer 2 attacks: This section explains how Cisco Catalyst switches can be configured to mitigate several common Layer 2 attacks.

  • Cisco Identity-Based Networking Services: This section examines how Cisco Identity-Based Networking Services (IBNS) uses IEEE 802.1x, RADIUS, and Extensible Authentication Protocol (EAP) technologies to selectively allow access to network resources, based on user credentials.

</feature>

The characteristics of Layer 2 LAN devices frequently make these devices attractive targets for attackers. If an attacker can compromise Layer 2, he has access to the upper layers. This chapter explores these Layer 2 ...

Get CCNA Security Official Exam Certification Guide (Exam 640-553) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.