Cisco devices have many features that are good for something but they can be easily exploited. You must know that the Internet is full of people that want to exploit your network for different or no reasons. We will show you the best ways for thinking ahead and securing the layer 2 of the network – the switches. Let’s start…
Tag: layer 2 security
Switch Security Attacks are the most popular topic in the switch Layer 2 Security. This is simply because they are dangerous. Cisco device security is surely one of the most interesting topics in the whole Cisco world. In the networking world in general this is also one of the most exciting and dynamic topic of all. In this small article we are starting to talk first of all about Cisco switch security that is followed by more detail articles about every aspect of the security and security issues, treats and troubleshooting in general.
In this picture, a switch is attacked with Mac address flooding attack. This attack will fill up the Mac address table of the switch with bogus source MAC addresses. In that case switch will not have the information own witch port are real MAC addresses of PC A, PC B or PC C. He will broadcast all the traffic from all PC-s to every other. That attack will make all packet sniffing possible from every computer.
Switch security does not stop malicious attacks from occurring if we don’t use some advanced methods in the configuration. In the next few posts, we will speak about some of the most appalling security attacks and how dangerous they are for our network. We will also show you the methods and technologies that exist to prevent these attacks to happen.
When we get to know all this different attacks and see how they can be intent to destroy our switch security, we will feel the need to learn what to do when they happen. In articles on the right side we are showing you how to prevent those attacks from happening and all the configuration that you will need to do on a network switch to prevent intrusions.
|Layer 2 security attacks:||Layer 2 attacks prevention:|