Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
3Activity

Table Of Contents

Basic VLAN Hopping Attack
Double 802.1q Encapsulation VLAN Hopping Attack
IP Phones VLAN Security
Voice VLAN Access
Voice VLAN Access -Attack
IP Phone PC Voice VLAN Access Setting
Security Best Practices for VLANsand Trunking
Agenda
MAC Address/CAM Table Review
Normal CAM Behavior (1/3)
Normal CAM Behavior (2/3)
Normal CAM Behavior (3/3)
CAM Overflow (1/2)
CAM Overflow (2/2)
Mac Flooding Switches with Macof
CAM Table Full
Countermeasures for MAC Attacks
Countermeasures for MAC Attacks with IP Phones
Port Security: Example Config
New Features for Port Security
Port Security
Port Security: What to Expect
Building the Layers
DHCP Function: High Level
DHCP Function: Lower Level
DHCP Attack Types DHCP Starvation Attack
Countermeasures for DHCP Attacks DHCP Starvation Attack = Port Security
DHCP Attack Types Rogue DHCP Server Attack
Countermeasures for DHCP Attacks Rogue DHCP Server = DHCP Snooping
DHCP Rogue Server
Summary of DHCP Attacks
DHCP Snooping Capacity
ARP Function Review
ARP Attack Tools
ARP Attack Tools: SSH/SSL
ARP Attack in Action
ARP Attack Clean Up
Phone ARP Features
Non DHCP Devices
Binding Table Info
Summary of ARP Attacks
More ARP Attack Information
Spoofing Attacks
Spoofing Attack: MAC
Spoofing Attack: IP
Spoofing Attack: IP/MAC
Countermeasures to Spoofing Attacks: IP Source Guard
Clear Up Source Guard
Spanning Tree Basics
Spanning Tree Attack Example
STP Attack Mitigation
Cisco Discovery Protocol (CDP)
CDP Attacks
Phone CDP Security
Switch Management
Layer 2 Security Best Practices (1/2)
Layer 2 Security Best Practices (2/2)
Reference Materials
Complete Your Online Session Evaluation
Matrix for Security Features (1/3)
Matrix for Security Features (2/3)
Matrix for Security Features (3/3)
0 of .
Results for:
No results containing your search query
P. 1
33218108 SEC 2002 Understanding and Preventing Layer 2 Attacks

33218108 SEC 2002 Understanding and Preventing Layer 2 Attacks

Ratings: (0)|Views: 490 |Likes:
Published by Arun Paranjothi

More info:

Published by: Arun Paranjothi on Oct 03, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/23/2013

pdf

text

original

You're Reading a Free Preview
Pages 6 to 50 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Tamás Balla liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->