Layer 2 Security Best Practices > Security Features on Switches [PDF]

Jul 4, 2008 - Deploy the Port Security feature to prevent unauthorized access from switching ports. Use the Private VLAN

4 downloads 16 Views 52KB Size

Recommend Stories


Mobile Banking Security Best Practices
If your life's work can be accomplished in your lifetime, you're not thinking big enough. Wes Jacks

Notes on Transport Layer Security
If your life's work can be accomplished in your lifetime, you're not thinking big enough. Wes Jacks

Cornerstone MFT Server Security Best Practices
I want to sing like the birds sing, not worrying about who hears or what they think. Rumi

Best Security Practices for WP site
Live as if you were to die tomorrow. Learn as if you were to live forever. Mahatma Gandhi

2012 Safety and Security Best Practices
Those who bring sunshine to the lives of others cannot keep it from themselves. J. M. Barrie

Application-layer security extensions
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

safety & security features
Sorrow prepares you for joy. It violently sweeps everything out of your house, so that new joy can find

Security Business Practices Reference
Make yourself a priority once in a while. It's not selfish. It's necessary. Anonymous

Network Layer Security Adaptation Profile
If you are irritated by every rub, how will your mirror be polished? Rumi

4 Best Practices for a Proactive Restaurant Security Program
Pretending to not be afraid is as good as actually not being afraid. David Letterman

Idea Transcript


Join | Sign In

View Your Cart

Search

Home

Shop By Cert

Formats

Cisco Networking Academy

Deals & Promotions

Video Training

Explore

Community

Home > Articles > Cisco Network Technology > Security > Security Features on Switches

You May Also Like

Security Features on Switches

Why Should You Consider Passing the SCYBER Exam? By Joseph Muniz Jan 5, 2016

By Yusuf Bhaiji. Sample Chapter is provided courtesy of Cisco Press. Date: Jul 4, 2008. Save

Digg

Del.icio.us

5 Steps to Building and Operating an Effective Security Operations Center (SOC) By Joseph Muniz Dec 21, 2015

Print

Chapter Information

Contents

Chapter Description

1. Securing Layer 2 2. Port-Level Traffic Controls 3. Private VLAN (PVLAN) 4. Access Lists on Switches 5. Spanning Tree Protocol Features 6. Dynamic Host Configuration Protocol (DHCP) Snooping 7. IP Source Guard 8. Dynamic ARP Inspection (DAI)

This chapter describes Layer 2 security basics and security features on switches available to combat network security threats.

Overview of Security Operations Center Technologies By Joseph Muniz, Nadhem AlFardan, Gary McIntyre Dec 15, 2015 See All Related Articles

From the Book Network Security Technologies and Solutions (CCIE Professional Development Series) $82.99

9. Advanced Integrated Security Features on HighEnd Catalyst Switches 10. Control Plane Policing (CoPP) Feature 11. CPU Rate Limiters 12. Layer 2 Security Best Practices 13. Summary 14. References

Layer 2 Security Best Practices To conclude this chapter, a list of best practices is presented here for implementing, managing, and maintaining secure Layer 2 network: Manage the switches in a secure manner. For example, use SSH, authentication mechanism, access list, and set privilege levels. Restrict management access to the switch so that untrusted networks are not able to exploit management interfaces and protocols such as SNMP. Always use a dedicated VLAN ID for all trunk ports. Be skeptical; avoid using VLAN 1 for anything. Disable DTP on all non-trunking access ports. Deploy the Port Security feature to prevent unauthorized access from switching ports. Use the Private VLAN feature where applicable to segregate network traffic at Layer 2. Use MD5 authentication where applicable. Disable CDP where possible. Prevent denial-of-service attacks and other exploitation by disabling unused services and protocols. Shut down or disable all unused ports on the switch, and put them in a VLAN that is not used for normal operations. Use port security mechanisms to provide protection against a MAC flooding attack. Use port-level security features such as DHCP Snooping, IP Source Guard, and ARP security where applicable. Enable Spanning Tree Protocol features (for example, BPDU Guard, Loopguard, and Root Guard). Use Switch IOS ACLs and Wire-speed ACLs to filter undesirable traffic (IP and non-IP). Previous Section

About

Affiliates

13. Summary | Next Section

Cisco Systems, Inc.

Contact Us

FAQ

Jobs

Legal Notice

Privacy Policy

Site Help

Site Map

Write for Us

© 2018 Pearson Education, Cisco Press. All rights reserved. 800 East 96th Street, Indianapolis, Indiana 46240

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.