Cisco ME-3400G-12CS-A-RF - Ethernet Access Switch Uživatelský manuál Strana 104

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 137
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 103
© 2009 Cisco Systems, Inc. All rights reserved.
105
Cisco PublicBRKBBA-2006
Ethernet Access Security Threats
Subscribers Access Nodes Infrastructure
Layer 2 service isolation
across switches
L2 Control Protocol Attack
(STP, CDP, VTP, etc…)
Man-in-the-Middle attacks on
critical management traffic
Non intentional forwarding of
traffic between UNI ports
MAC Flooding / Overflow Unauthenticated access to
the switch configuration file
DHCP Rogue Server DHCP Resource Overflow Unconfigured Ports providing
network access
IP & MAC Address Spoofing Unicast, multicast, or
broadcast storms
Unauthorized network
access, junk traffic
ARP Spoofing (Man-in-the-
Middle)
Infected users flooding the
network / Malicious users
attacking the Priority traffic
queue
Unauthenticated network
access by client devices
Attack targets can be divided into three main categories:
Zobrazit stránku 103
1 2 ... 99 100 101 102 103 104 105 106 107 108 109 ... 136 137

Komentáře k této Příručce

Žádné komentáře