Chapter 8. Campus Network Security
Attention has traditionally been paid to network perimeter security, such as firewall, and to mitigating Layer 3 attacks. However, networks must be protected against Layer 2 attacks, also. These are launched from devices inside the network by either a rogue device or a legitimate device that has been compromised. Rogue devices might be placed maliciously or might just be connected to an access switch by an employee wanting more switch port or wireless access. They include:
Wireless routers or hubs
Access switches
Hubs
A switch might become the Spanning Tree root bridge, and disrupt user traffic. Use root guard and bpdu guard commands to prevent this. (Spanning tree security is discussed later in this chapter.)
There ...
Get CCNP Quick Reference Sheets Bundle: Exams 642-901, 642-812, 642-845, 642-825 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.