
© 2009 Cisco Systems, Inc. All rights reserved.
105
Cisco PublicBRKBBA-2006
Ethernet Access Security Threats
Subscribers Access Nodes Infrastructure
Layer 2 service isolation
across switches
L2 Control Protocol Attack
(STP, CDP, VTP, etc…)
Man-in-the-Middle attacks on
critical management traffic
Non intentional forwarding of
traffic between UNI ports
MAC Flooding / Overflow Unauthenticated access to
the switch configuration file
DHCP Rogue Server DHCP Resource Overflow Unconfigured Ports providing
network access
IP & MAC Address Spoofing Unicast, multicast, or
broadcast storms
Unauthorized network
access, junk traffic
ARP Spoofing (Man-in-the-
Middle)
Infected users flooding the
network / Malicious users
attacking the Priority traffic
queue
Unauthenticated network
access by client devices
Attack targets can be divided into three main categories:
Komentáře k této Příručce