Professional Documents
Culture Documents
11.port Security-Storm Control-Spoofing Attack Mitigating
11.port Security-Storm Control-Spoofing Attack Mitigating
• Rogue network
devices can be:
– Wireless hubs
– Wireless routers
– Access switches
– Hubs
• These devices are
typically connected
at access level
switches.
Switch Attack Categories
• VLAN Hopping.
• MAC layer attacks
• VLAN attacks
• Spoofing attacks
• Attacks on switch devices
Explaining VLAN Hopping
VLAN Hopping with Double Tagging
Mitigating VLAN Hopping
MAC Flooding Attack
Port Security
Switch#show port-security
Switch#show port-security
Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security
Action
(Count) (Count) (Count)
---------------------------------------------------------------------------
Fa5/1 11 11 0 Shutdown
Fa5/5 15 5 0 Restrict
Fa5/11 5 4 0 Protect
---------------------------------------------------------------------------
Storm Control
LAN Storm
Broadcast Broadcast
Broadcast Broadcast
Broadcast Broadcast
Switch(config-if)#
storm-control {{broadcast | multicast | unicast} level {level
[level-low]|bps bps [bps-low]|pps pps [pps-low]}} | {action
{shutdown|trap}}
• Configure to protect
against rogue DHCP
servers.
• Configure for dynamic
ARP inspection.