across a network (unless a Layer 2 tunneling mechanism is in place). Limit it to run only between trusted devices and disable it everywhere else. However, CDP is required on any access port when you are attaching a Cisco phone to establish a trust relationship.
  • Secure the spanning tree topology: It is important to protect the STP process of the switches that compose the infrastructure. Inadvertent or malicious introduction of STP BPDUs could potentially overwhelm a device or pose a DoS attack. The first step in stabilizing a spanning tree installation is to positively identify the intended root bridge in the design and to hard set the STP bridge priority of that bridge to an acceptable root value. Do the same for the designated backup root bridge. These actions protect against inadvertent shifts in STP due to an uncontrolled introduction of a new switch.
  • On some platforms, the BPDU guard feature may be available. If so, enable it on access ports in conjunction with the PortFast feature to protect the network from unwanted BPDU traffic injection. Upon receipt of a BPDU, the feature automatically disables the port. Follow these best practices to mitigate compromises through a switch: Note: The switchport host command is a macro that executes several configuration commands. It does not have a no form to disable it. To return an interface to its default configuration, use the default interface interface-id global configuration command. Web Links Cisco IOS Firewall Overview
    Content 8.7 Switch Security Lab Exercises 8.7.1 Lab 8-1 Securing the Layer 2 Switching Devices Lab Activity Lab Exercise: Lab 8-1 Securing the Layer 2 Switching Devices
    Content 8.7 Switch Security Lab Exercises 8.7.2 Lab 8-2 Securing Spanning Tree Protocol Lab Activity Lab Exercise: Lab 8-2 Securing Spanning Tree Protocol
    Content 8.7 Switch Security Lab Exercises 8.7.3 Lab 8-3 Securing VLANs with Private VLANs, RACLs, and VACLs Lab Activity Lab Exercise: Lab 8-3 Securing VLANs with Private VLANs, RACLs, and VACLs
    Content Summary This module covered the major vulnerabilities to unsecured VLAN topologies. Hackers use MAC spoofing, Address Resolution Protocol (ARP) spoofing, and DHCP spoofing to disrupt the network and gain access. Using port security, dynamic ARP inspection (DAI), DHCP snooping, and IP source guard help to reduce such attacks. VLAN access control lists (VACLs) and private VLANs (PVLANs) filter and control VLAN traffic. In addition, vty ACLs and Secure Shell Protocol (SSH) help control connectivity to the network devices used in the topology.