Cisco ME-3400G-12CS-A-RF - Ethernet Access Switch Instrukcja Użytkownika Strona 104

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 137
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 103
© 2009 Cisco Systems, Inc. All rights reserved.
105
Cisco PublicBRKBBA-2006
Ethernet Access Security Threats
Subscribers Access Nodes Infrastructure
Layer 2 service isolation
across switches
L2 Control Protocol Attack
(STP, CDP, VTP, etc…)
Man-in-the-Middle attacks on
critical management traffic
Non intentional forwarding of
traffic between UNI ports
MAC Flooding / Overflow Unauthenticated access to
the switch configuration file
DHCP Rogue Server DHCP Resource Overflow Unconfigured Ports providing
network access
IP & MAC Address Spoofing Unicast, multicast, or
broadcast storms
Unauthorized network
access, junk traffic
ARP Spoofing (Man-in-the-
Middle)
Infected users flooding the
network / Malicious users
attacking the Priority traffic
queue
Unauthenticated network
access by client devices
Attack targets can be divided into three main categories:
Przeglądanie stron 103
1 2 ... 99 100 101 102 103 104 105 106 107 108 109 ... 136 137

Komentarze do niniejszej Instrukcji

Brak uwag