
333
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
Caveats
¥ All attacks and mitigation techniques assume
a switched Ethernet network running IP
If shared Ethernet access is used (WLAN, Hub, etc.)
most of these attacks get much easier
If you arenÕt using Ethernet as your L2 protocol, some
of these attacks may not work, but you may be
vulnerable to different ones JJ
JJ
¥ Attacks in the ÒtheoreticalÓ category can move
to the practical in a matter of days
¥ All testing was done on Cisco equipment,
Ethernet switch attack resilience varies widely
from vendor to vendor
¥ This is not a comprehensive talk on
configuring Ethernet switches for security; the
focus is on L2 attacks and their mitigation
Commentaires sur ces manuels