Popular Posts
Mitigating Layer 2 Attacks
Like routers, both Layer 2 and Layer 3 switches have their own set of network security requirements.
Access to switches is a convenient entry point for attackers who are intent on
illegally gaining access to a corporate network. With access to a switch, an attacker can
set up rogue access points and protocol analyzers, and launch all types of attacks from
within the network. Attackers can even spoof the MAC and IP addresses of critical
servers to do a great deal of damage.
Tags: Mitigating Layer 2 Attacks