
© 2009 Cisco Systems, Inc. All rights reserved.
121
Cisco PublicBRKBBA-2006
• Infrastructure attacks exploit insecure data, control and management planes
as well as weak physical security
• It is essential to ensure that only valid traffic is allowed through the switch
through filtering and blocking. This must be done at the edge of the SP
network e.g. Metro Access switches
Data Plane
Infrastructure Security
Security Threats
Man-in-the-Middle attacks on critical
management traffic
Unauthenticated access to the switch
configuration
Unauthenticated network access by client
devices
Unconfigured Ports providing network
access
Unauthorized network access, junk traffic
Management
Plane
Physical
Security
Komentáře k této Příručce