Chapter 10

LAN Security Concepts

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • How do you use endpoint security to mitigate attacks?

  • How are AAA and 802.1X used to authenticate LAN endpoints and devices?

  • What are Layer 2 vulnerabilities?

  • How does a MAC address table attack compromise LAN security?

  • How do LAN attacks compromise LAN security?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

Distributed Denial of Service (DDoS) Page 277

zombies Page 277

data breach Page 277

malware Page 277

ransomware Page 277

WannaCry Page 277

virtual private network (VPN) Page 278

next-generation firewall (NGFW) Page 278

network access control (NAC) Page ...

Get Switching, Routing, and Wireless Essentials Companion Guide (CCNAv7) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.