LAN switch security : what hackers know about your switches /
LAN Switch Security: What Hackers Know About Your Switches A practical guide to hardening Layer 2 devices and stopping campus network attacks Eric Vyncke Christopher Paggen, CCIE® No. 2659 Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet s...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, Ind. :
Cisco Press,
2007.
|
Colección: | Cisco Press networking technology series.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- pt. I. Vulnerabilities and mitigation techniques
- Ch. 1. Introduction to security
- Ch. 2. Defeating a learning bridge's forwarding process
- Ch. 3. Attacking the spanning tree protocol
- Ch. 4. Are VLANS safe?
- Ch. 5. Leveraging DHCP weaknesses
- Ch. 6. Exploiting IPv4 ARP
- Ch. 7. Exploiting IPv6 neighbor discovery and router advertisement
- Ch. 8. What about power over ethernet?
- Ch. 9. Is HSRP resilient?
- Ch. 10. Can we bring VRRP down?
- Ch. 11. Information leaks with Cisco ancillary protocols
- pt. II. How can a switch sustain a denial of service attack?
- Ch. 12. Introduction to denial of service attacks
- Ch. 13. Control plane policing
- Ch. 14. Disabling control plane protocols
- Ch. 15. Using switches to detect a data plane DoS
- pt. III. Using switches to augment the network security
- Ch. 16. Wire speed access control lists
- Ch. 17. Identity-based networking services with 802.1X
- pt. IV. What is next in LAN security?
- Ch. 18. IEEE 802.1AE
- App. Combining IPsec with L2TPv3 for secure pseudowire.