Access Layer Security Features Part 3: Spoofing Protections

The previous posts I’ve made around access layer security features have been somewhat more focused on protecting the network itself from attack. One of the biggest security issues with Ethernet / IP is that there are no built-in protections against Continue reading Access Layer Security Features Part 3: Spoofing Protections

Access Layer Security Features Part 2: Spanning Tree

Spanning tree is the only commonly deployed Ethernet control plane protocol today.  Eventually, something like TRILL or maybe Shortest Path Bridging will probably eliminate the need for Spanning Tree, but we’re definitely not there yet. Since access ports are designed Continue reading Access Layer Security Features Part 2: Spanning Tree

Access Layer Security Features Part 1: Port Security

Ethernet and IP by themselves don’t really provide security at the access layer.  They can easily be spoofed and attacked by hosts connected to the same network.  Accordingly, over the years vendors have created a variety of mechanisms to secure Continue reading Access Layer Security Features Part 1: Port Security

Data Center Server Access Topologies: Part 4, Uplinks

In this post I’ll briefly touch on some of the different ways access blocks can be connected up to the distribution layer in your data center. Spanning Tree Topologies I’ve outlined four different possible spanning tree topologies below.  Realistically though, Continue reading Data Center Server Access Topologies: Part 4, Uplinks