Chapter 11

Switch Security Configuration

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • How do you implement port security to mitigate MAC address table attacks?

  • How do you configure DTP and native VLAN to mitigate VLAN attacks?

  • How do you configure DHCP snooping to mitigate DHCP attacks?

  • How do you configure ARP inspection to mitigate ARP attacks?

  • How do you configure PortFast and BPDU Guard to mitigate STP attacks?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

MAC address table overflow Page 315

error-disabled state Page 317

DHCP snooping binding table Page 329

Introduction (11.0)

An important part of your responsibility as a network ...

Get Switching, Routing, and Wireless Essentials Companion Guide (CCNAv7) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.