14.9.11 Packet Tracer - Layer 2 Vlan Security -
By default, switches are trusting. And trust, in security, is a vulnerability.
On any port that should not be a trunk (i.e., all end-user ports), explicitly turn off trunking: 14.9.11 packet tracer - layer 2 vlan security
In the world of networking, we often talk about firewalls, ACLs, and encryption. But what happens if an attacker simply unplugs a legitimate user’s laptop and plugs in a rogue device? What if they spoof a VLAN or launch a MAC flood? By default, switches are trusting