2.2. Securing the Switch InfrastructureΒΆ

  • Protecting the Root Bridge
  • Defending against Rogue Hubs and Switches
  • Preventing Switching Loops
  • Preventing Rogue DHCP Servers
  • Defending againt Rogue Devices