Switches are fantastic devices, allowing you to create VLANs, trunks, as well as offer fast and somewhat private communication. However, the basic nature of switch operation, as well as the advent of trunk links, VLAN tags and some backwards compatibility features, created some extra security risks that were not anticipated upon the advent of the technology. In this course, Securing the Switch for Cisco CCNA 200-125/100-10, you will start off by learning about frame double-tagging. Next, you'll move onto the native VLAN security issues and DTP. You'll wrap up the course with a demonstration of creating a secure base configuration for a switch. By the end of this course, you'll know how to put a secure base configuration on a switch, mitigating many layer 2 attacks against Ethernet.
Hi everyone, my name is Ross Bagurdes and welcome to my course "Securing the Switch."
I am a network engineer with 20 years experience in building and managing enterprise networks, and teaching people about them.
Switches may or may not have been part of the Ethernet vision when it was being developed in the 70’s and 80’s. However, by the mid to late 90’s switching became an important piece of data networking, and it hasn’t stopped growing since. Because of the rapid implementation and growth of Ethernet and switching, there was not always an eye focused on security flaws in switch design, especially in Trunk link operation.
In this course we will cover:
1. The Native VLAN and the security issues it creates
2. MAC Address Flooding
3. Switchport Port Security
By the end this course, you’ll know how to put a secure base configuration on a switch, mitigating many layer 2 attacks against Ethernet.
Before beginning the course you should be familiar with VLANs and VLAN trunking. From here, you should feel comfortable diving into the rest of the CCNA Series. I hope you’ll join me on this journey to learn Switch Security with the Securing the Switch course, at Pluralsight.