Securing Band 2
With the accelerated advance of IP networks in the accomplished years, high-end switching has played one of the most
fundamental and capital roles in affective abstracts reliably, efficiently, and deeply beyond networks. Cisco Catalyst
switches are the baton in the switching bazaar and above players in today's networks.
The data-link band (Layer 2 of the OSI model) provides the anatomic and procedural agency to alteration data
between arrangement entities with interoperability and interconnectivity to added layers, but from a security
perspective, the data-link band presents its own challenges. Arrangement aegis is alone as able as the weakest
link, and Band 2 is no exception. Applying capital aegis measures to the high layers (Layers 3 and
higher) does not account your arrangement if Band 2 is compromised. Cisco switches action a advanced ambit of security
features at Band 2 to assure the arrangement cartage breeze and the accessories themselves.
Understanding and advancing for arrangement threats is important, and hardening Band 2 is acceptable imperative.
Cisco is continuously adopting the bar for security, and aegis affection availability at Band 2 is no exception. The
sections that chase highlight the Band 2 aegis appearance accessible on Cisco Catalyst switches.
Note
The agreement examples apparent in this affiliate are based on Cisco IOS Software syntax alone (also
known as built-in mode). Catalyst Operating System (CatOS) software-based examples are not covered.