O'Reilly logo

Implementing Cisco Networking Solutions by Harpreet Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Data plane security

As discussed, the data plane consists of the interfaces and the associated forwarding tables that are used for faster switching of packets. Any attack on the data plane would typically be an attack to push a lot of traffic through the network to try and block the legitimate traffic from being transported across the network.

The access network in an enterprise is typically a layer 2 network. The following figure shows the types of attacks that can happen at the access network at a layer 2 level and the defense mechanisms/features that are used to prevent these attacks:

Figure 3: Layer 2 attacks and defense

We will describe ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required