Minimizing Service Loss and Data Theft

This chapter provides information and commands concerning the following topics:

• Configuring static MAC addresses

• Switch port security

• Verifying switch port security

• Sticky MAC addresses

• Mitigating VLAN hopping: best practices

• Configuring private VLANs (PVLAN)

• Verifying PVLANs

• Configuring protected ports

• VLAN access maps

• Verifying VLAN access maps

• DHCP snooping

• Verifying DHCP snooping

• Dynamic ARP Inspection (DAI)

• Verifying DAI

• 802.1x port-based authentication

• Cisco Discovery Protocol (CDP) security issues

• Configuring the Secure Shell (SSH) protocol

• vty access control lists (ACL)

• Restricting web interface sessions with ACLs

• Disabling unneeded services

• Securing end-device access ports

Was this article helpful?

0 0

Post a comment