Securing Band 2

Securing Band 2

With the accelerated advance of IP networks in the accomplished years, high-end switching has played one of the most

fundamental and capital roles in affective abstracts reliably, efficiently, and deeply beyond networks. Cisco Catalyst

switches are the baton in the switching bazaar and above players in today's networks.

The data-link band (Layer 2 of the OSI model) provides the anatomic and procedural agency to alteration data

between arrangement entities with interoperability and interconnectivity to added layers, but from a security

perspective, the data-link band presents its own challenges. Arrangement aegis is alone as able as the weakest

link, and Band 2 is no exception. Applying capital aegis measures to the high layers (Layers 3 and

higher) does not account your arrangement if Band 2 is compromised. Cisco switches action a advanced ambit of security

features at Band 2 to assure the arrangement cartage breeze and the accessories themselves.

Understanding and advancing for arrangement threats is important, and hardening Band 2 is acceptable imperative.

Cisco is continuously adopting the bar for security, and aegis affection availability at Band 2 is no exception. The

sections that chase highlight the Band 2 aegis appearance accessible on Cisco Catalyst switches.

Note

The agreement examples apparent in this affiliate are based on Cisco IOS Software syntax alone (also

known as built-in mode). Catalyst Operating System (CatOS) software-based examples are not covered.