O'Reilly logo

Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide, Second Edition by Catherine Paquet

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Securing the Data Plane on Cisco Catalyst Switches

In this chapter, you learn that, like routers, both Layer 2 and Layer 3 switches have their own set of network security requirements. Access to switches is a convenient entry point for attackers who are intent on illegally gaining access to a corporate network. With access to a switch, an attacker can set up rogue access points and protocol analyzers and launch all types of attacks from within the network. Attackers can even spoof the MAC and IP addresses of critical servers to do much damage. In this chapter, you will examine various Layer 2 attacks and strategies to mitigate them. Topics covered in this chapter include the following:

• An introduction to fundamental switching concepts, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required