First page Back Continue Last page Image
Secure Unused Ports
All switch ports (interfaces) should be secured before the switch is deployed for production use
How a port is secured depends on its function
- Disable all unused ports on a switch
- To configure a range of ports, use the interface range command
Switch(config)# interface range type module/first-number – last-number
Layer 2 attacks are some of the easiest for hackers to deploy but these threats can also be mitigated with some common Layer 2 solutions