Common L2 threats (and how to mitigate)

The best practices for securing switches; Select an unused VLAN (other than VLAN1) and use for the native VLAN on all trunks Avoid using VLAN1 anywhere because it is the default Admin configure access ports as access ports so users cannot negotiate a trunk and disable the negotiation of trunking…

CCNA Security

I have found myself using the Cisco ASA more and more in the day job. This is mainly due to me changing jobs back in March and looking after customers who have ASA deployed (and some PIX :-)) for both firewalls and VPN’s, as a result I really need…