SWITCH10S07L06.pptx

Download Report

Transcript SWITCH10S07L06.pptx

Module Summary
 Key switch security issues should be identified on a switched
network and proper measures taken to mitigate known attacks.
 VLAN trunk links should be secured to defend against VLAN
hopping attacks.
 Port security, DHCP snooping, and DAI are used to protect the
network against spoofing attacks.
 When placed into service, switches should be configured
according to recommendations to secure the switch device and its
protocols from attacks that can be launched through a switch.
© 2009 Cisco Systems, Inc. All rights reserved.
SWITCH v1.0—7-1
© 2009 Cisco Systems, Inc. All rights reserved.
SWITCH v1.0—7-2