Layer 2 Security Feeling satisfied with securing access to the physical switch and cables as well as access to the Catalyst switch IOS, our next step on our secure ladder is to get to the core of our switching functions and secure the possible vulnerabilities that occur at the Data Link layer. The transparent functions that our switches perform, such as MAC address learning … [Read more...]