First page Back Continue Last page Image

Secure Unused Ports

All switch ports (interfaces) should be secured before the switch is deployed for production use

How a port is secured depends on its function

Switch(config)# interface range type module/first-number – last-number

Layer 2 attacks are some of the easiest for hackers to deploy but these threats can also be mitigated with some common Layer 2 solutions