tailieunhanh - Lecture CCNA security partner - Chapter 5: Securing the Data Plane on Cisco Catalyst Switches

Topics covered in this chapter include the following: An introduction to fundamental switching concepts, starting with the building blocks of VLANs and trunking; an introduction to other building blocks of switching technology, including Spanning Tree Protocol for high availability; a revisit and further explanation of security threats that exploit vulnerabilities in the switching infrastructure;. | Securing the Data Plane on Cisco Catalyst Switches 1 Contents Topics covered in this chapter include the following: • An introduction to fundamental switching concepts, starting with the building blocks of VLANs and trunking • An introduction to other building blocks of switching technology, including Spanning Tree Protocol for high availability • A revisit and further explanation of security threats that exploit vulnerabilities in the switching infrastructure • A description of how to plan and develop a strategy for protecting the data plane • A description of the Spanning Tree Protocol Toolkit found on Cisco IOS routers that prevents STP operations from having an impact on the security posture • A review of port security and how to configure it, to illustrate security controls that are aimed at mitigating MAC spoofing and other threats Overview Overview of VLANs and Trunking Trunking and Tagging DTP (Dynamic Trunking Protocol) Native VLANs Configuring VLANs and Trunks | Securing the Data Plane on Cisco Catalyst Switches 1 Contents Topics covered in this chapter include the following: • An introduction to fundamental switching concepts, starting with the building blocks of VLANs and trunking • An introduction to other building blocks of switching technology, including Spanning Tree Protocol for high availability • A revisit and further explanation of security threats that exploit vulnerabilities in the switching infrastructure • A description of how to plan and develop a strategy for protecting the data plane • A description of the Spanning Tree Protocol Toolkit found on Cisco IOS routers that prevents STP operations from having an impact on the security posture • A review of port security and how to configure it, to illustrate security controls that are aimed at mitigating MAC spoofing and other threats Overview Overview of VLANs and Trunking Trunking and Tagging DTP (Dynamic Trunking Protocol) Native VLANs Configuring VLANs and Trunks Configuring Inter-VLAN Routing Spanning Tree Overview STP , RSTP, PVRST+ Mitigating Layer 2 Attacks 4 Domino Effect If Layer 2 is Compromised Layer 2 independence enables interoperability and interconnectivity. However, from a security perspective, Layer 2 independence creates a challenge because a compromise at one layer is not always known by the other layers. If the initial attack comes in at Layer 2, the rest of the network can be compromised in an instant. Network security is only as strong as the weakest link, and that link might be the data link layer Layer 2 Best Practices The following list suggests Layer 2 security best practices. All of these suggestions are dependent upon your security policy. • Manage switches in as secure a manner as possible (SSH, OOB, permit lists, and so on). • Whenever practical, declare the VLAN ID used on trunk ports with the switchport trunk allowed vlan command • Do not use VLAN 1 for anything. • Set all user ports to nontrunking (unless .

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.