Cisco Ethernet switch Manuel d'utilisateur Page 5

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 84
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 4
555
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
The Domino Effect
¥ Unfortunately this means if one layer is hacked, communications are
compromised without the other layers being aware of the problem
¥ Security is only as strong as your weakest link
¥ When it comes to networking, layer 2 can be a VERY weak link
Physical Links
Physical Links
MAC Addresses
MAC Addresses
IP Addresses
IP Addresses
Protocols/Ports
Protocols/Ports
Application Stream
Application Stream
Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Data Link
Data Link
Physical
Physical
Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Data Link
Data Link
Physical
Physical
Initial Compromise
Initial Compromise
Compromised
Compromised
Vue de la page 4
1 2 3 4 5 6 7 8 9 10 ... 83 84

Commentaires sur ces manuels

Pas de commentaire