Chapter 15. Securing Switch Access
Port Security Using MAC Addresses—. This section explains how to configure switch ports to allow network access to only hosts with specific or learned MAC addresses.
Port-Based Security Using IEEE 802.1x—. This section discusses a method you can use to require user authentication before network access is offered to a client host.
Mitigating Spoofing Attacks—. This section covers several types of attacks in which a malicious user generates spoofed information to become a man-in-the-middle. When an attacker is wedged between other hosts and a router or gateway, for example, he can examine and exploit ...