
818181
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
A Relevant Case Study
¥ Do you have a part of your network that looks like this?
Outside
Inside
Internet
Internal
vlan007
vlan008
¥ While it is technically feasible to make this ÒsecureÓ, consider the
ramifications:
What happens if the switch is compromised?
Does SECOPS control the VLAN settings on the switch? (likely not)
This means you now have NETOPS folks taking actions that could adversely affect
security
Realize your security perimeter now includes the switch
Security Perimeter
Security Perimeter
Comentarios a estos manuales