Chapter 8. Campus Network Security

Attention has traditionally been paid to network perimeter security, such as firewall, and to mitigating Layer 3 attacks. However, networks must be protected against Layer 2 attacks, also. These are launched from devices inside the network by either a rogue device or a legitimate device that has been compromised. Rogue devices might be placed maliciously or might just be connected to an access switch by an employee wanting more switch port or wireless access. They include:

  • Wireless routers or hubs

  • Access switches

  • Hubs

A switch might become the Spanning Tree root bridge, and disrupt user traffic. Use root guard and bpdu guard commands to prevent this. (Spanning tree security is discussed later in this chapter.)

There ...

Get CCNP Quick Reference Sheets Bundle: Exams 642-901, 642-812, 642-845, 642-825 now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.