The MAC address table in a switch contains the MAC addresses associated with each physical port and the associated VLAN for each port. Some types of security attacks are described here, but the details of how some of these attacks work are beyond the scope of this course.Īll Catalyst switch models use a MAC address table for Layer 2 switching. The more aware networking professionals within an organization are regarding security attacks and the dangers they pose, the better. Security is a layered process that is essentially never complete. MAC Address Flooding – Basic switch security does not stop malicious attacks. With this information an attacker can launch further attacks or even insert a rogue device. By examining downloaded frames, attackers can determine IP addresses of network devices, protocols being used, valid server names and IP addresses, etc. Wired LANs are a common source of attack because so much information can be gained about the wired network using free downloadable tools.
0 Comments
Leave a Reply. |