Chapter 10
LAN Security Concepts
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
How do you use endpoint security to mitigate attacks?
How are AAA and 802.1X used to authenticate LAN endpoints and devices?
What are Layer 2 vulnerabilities?
How does a MAC address table attack compromise LAN security?
How do LAN attacks compromise LAN security?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
Distributed Denial of Service (DDoS) Page 277
virtual private network (VPN) Page 278
Get Switching, Routing, and Wireless Essentials Companion Guide (CCNAv7) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.