Cisco Ethernet switch Manuel d'utilisateur Page 54

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 84
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 53
545454
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
BB
F
F
Spanning Tree Attack Example 2/2
¥ Send BPDU messages to become
root bridge
Attacker
Access Switches
Root
Root
F
F
F
F
F
F
F
F
F
F
Root
Root
BB
X
X
The attacker then sees frames he
shouldnÕt
MITM, DoS, etc. all possible
Any attack is very sensitive to
the original topology, trunking,
PVST, etc.
Although STP takes link speed
into consideration, it is always
done from the perspective of the
root bridge. Taking a Gb
backbone to half-duplex 10 Mb
was verified
Requires attacker is dual homed to
two different switches (with a hub,
it can be done with just one
interface on the attacking host)
Vue de la page 53
1 2 ... 49 50 51 52 53 54 55 56 57 58 59 ... 83 84

Commentaires sur ces manuels

Pas de commentaire