Access Layer Security Features Part 3: Spoofing Protections

The previous posts I’ve made around access layer security features have been somewhat more focused on protecting the network itself from attack. One of the biggest security issues with Ethernet / IP is that there are no built-in protections against Continue reading Access Layer Security Features Part 3: Spoofing Protections

Access Layer Security Features Part 2: Spanning Tree

Spanning tree is the only commonly deployed Ethernet control plane protocol today.  Eventually, something like TRILL or maybe Shortest Path Bridging will probably eliminate the need for Spanning Tree, but we’re definitely not there yet. Since access ports are designed Continue reading Access Layer Security Features Part 2: Spanning Tree