September 2015
Intermediate to advanced
608 pages
21h 29m
English
Let’s begin with best practices for securing your switches and then discuss in more detail which best practice mitigates which type of attack.
Best practices for securing your infrastructure, including Layer 2, include the following:
Select an unused VLAN (other than VLAN 1) and use that for the native VLAN for all your trunks. Do not use this native VLAN for any of your enabled access ports.
Avoid using VLAN 1 anywhere, ...
Read now
Unlock full access