© 2006 Cisco Systems, Inc. All rights reserved.SND v Module Summary To secure network access at Layer 2, follow these steps: –Protect administrative access to the switch. –Protect the switch management port. –Turn off unused network services. –Lock down the ports. –Use Cisco Catalyst switch security features. VLAN hopping, STP manipulation, ARP spoofing, CAM table overflow, and MAC spoofing are the Layer 2 attacks used to compromise LANs. Port security used along with security best practices will mitigate against these attacks. Cisco Catalyst switch security features greatly reduce the chances of network attack. WLANs are secured by applying i mechanisms, which include 802.1x authentication.
© 2006 Cisco Systems, Inc. All rights reserved.SND v2.03-2