Deploying Layer 2 security controls
In this section, you will learn how to deploy various Layer 2 security controls on a Local Area Network (LAN) to prevent various internal cyberattacks. You will learn how to secure STP, implementing security controls to prevent users from performing IP and Media Access Control (MAC) address spoofing and MitM attacks.
Important note
STP is a Layer 2 loop prevention protocol. To learn more about STP, please see the official documentation from Cisco at https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/5234-5.html.
Before building the lab environment, the following factors are of importance:
- In the lab topology, use Cisco 2960 switches.
- Use straight-through cables to interconnect each device, as shown in the network diagram depicted in Figure 15.10.
Please build the following network topology within Cisco Packet Tracer 7.3.1 for this lab exercise: