
838383
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
Lessons Learned
¥ Carefully consider any time you must
count on VLANs to operate in a
security role
If properly configured, our testing did not
discover a method of VLAN Hopping using
Cisco switches
Pay close attention to the configuration
Understand the organizational implications
¥ Evaluate your security policy while
considering the other issues raised in
this session
Is there room for improvement?
What campus risks are acceptable based
on your policy?
¥ Deploy, where appropriate, L2
security best practices
Commentaires sur ces manuels