Chapter Summary
Network security should be applied to all seven layers of the OSI model; however, this chapter discussed network security from a Layer 2 (data link layer) perspective. Some basic rules to keep in mind when setting up a secure Layer 2 switch-based network include the following:
VLANs should be set up so that they clearly separate logical components of your network.
VLANs are based on the level of security each VLAN requires.
If any switch ports are not being used, these ports should be placed in a VLAN designed to collect these unused ports.
Using port security on your switch as a security mechanism provides a level of security because port security is based on permitted and denied MAC addresses. Because a MAC address is a hardware ...
Get LAN Switching first-step now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.