Switch Security Configuration
Apart from configuring a network, it is of utmost importance to protect it too. Usually, network professionals think only about attacks coming from outside the network, but it’s really important to know that threat can also come from within the network as well.
Most of the time, such threats are usually caused innocently like for example, an employee adding a switch to gain more ethernet ports, but at time such threats can be really malicious caused by a disgruntled employee or an actor who has access to the Corporate network.
We will see how to protect the network from malicious attacks from within itself.