Cisco Ethernet switch Manuale Utente Pagina 54

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 84
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 53
545454
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
BB
F
F
Spanning Tree Attack Example 2/2
¥ Send BPDU messages to become
root bridge
Attacker
Access Switches
Root
Root
F
F
F
F
F
F
F
F
F
F
Root
Root
BB
X
X
The attacker then sees frames he
shouldnÕt
MITM, DoS, etc. all possible
Any attack is very sensitive to
the original topology, trunking,
PVST, etc.
Although STP takes link speed
into consideration, it is always
done from the perspective of the
root bridge. Taking a Gb
backbone to half-duplex 10 Mb
was verified
Requires attacker is dual homed to
two different switches (with a hub,
it can be done with just one
interface on the attacking host)
Vedere la pagina 53
1 2 ... 49 50 51 52 53 54 55 56 57 58 59 ... 83 84

Commenti su questo manuale

Nessun commento