Security Protocols in the Data Link Layer

July 4, 2023

Security Protocols in the Data Link Layer

By Graciela Martínez, Head of LACNIC CSIRT

Integrating security into systems has become essential to protect the confidentiality, integrity, and availability of the information that is transmitted.

We have often heard about in-depth security or layered security in reference to the different levels of protection that surround the critical assets of an organization’s core network.

In this article we will focus on the data link layer and some of the security protocols we can implement there.

(Free access, no subscription required)

Data link layer

As a quick overview, let’s briefly recall that the data link layer —known as layer 2 in the Open Systems Interconnection model (OSI model)— is responsible for connecting the physical layer with the layers above it. In this layer, the information travels in the form of datagrams or frames.

THE OSI MODEL

Application layer
Network services to applications
Presentation layer
Data representation
Session layer
Communication between network devices
Transport layer
End-to-end connection and datareliability
Network layer
Logical routing and addressing
Data link layer
Physical addressing (MAC and LLC)
Physical layer
Binary signal and transmission

This layer performs several functions, all or part of which may be implemented depending on the protocol that is used:

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

1 Comentarios
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Lindsey John
1 year ago

Great article! Security protocols at the data link layer are often overlooked, yet they play a crucial role in preventing threats like ARP poisoning and MAC spoofing. The breakdown of IEEE 802 protocols and practical security measures is especially helpful. Thanks for shedding light on this important topic!