Cisco Ethernet switch Manuel d'utilisateur Page 3

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 84
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 2
333
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
Caveats
¥ All attacks and mitigation techniques assume
a switched Ethernet network running IP
If shared Ethernet access is used (WLAN, Hub, etc.)
most of these attacks get much easier
If you arenÕt using Ethernet as your L2 protocol, some
of these attacks may not work, but you may be
vulnerable to different ones JJ
JJ
¥ Attacks in the ÒtheoreticalÓ category can move
to the practical in a matter of days
¥ All testing was done on Cisco equipment,
Ethernet switch attack resilience varies widely
from vendor to vendor
¥ This is not a comprehensive talk on
configuring Ethernet switches for security; the
focus is on L2 attacks and their mitigation
Vue de la page 2
1 2 3 4 5 6 7 8 ... 83 84

Commentaires sur ces manuels

Pas de commentaire