Cisco Systems, 2006. — 428 p.
LAN devices, including wireless devices operating at Layer 2, are open to attacks because of vulnerabilities that are inherent to Layer 2 . This module describes Layer 2 vulnerabilities, how to account for vulnerabilities in a security policy, and how to enable the security features that are built into Cisco LAN and Cisco wireless LAN (WLAN) products. The goal of this module is to configure LAN devices to control access, resist attacks, guard other network devices and systems, and protect the integrity and confidentiality of network traffic.