Cisco Ethernet switch Uživatelský manuál Strana 3

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 84
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 2
333
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
Caveats
¥ All attacks and mitigation techniques assume
a switched Ethernet network running IP
If shared Ethernet access is used (WLAN, Hub, etc.)
most of these attacks get much easier
If you arenÕt using Ethernet as your L2 protocol, some
of these attacks may not work, but you may be
vulnerable to different ones JJ
JJ
¥ Attacks in the ÒtheoreticalÓ category can move
to the practical in a matter of days
¥ All testing was done on Cisco equipment,
Ethernet switch attack resilience varies widely
from vendor to vendor
¥ This is not a comprehensive talk on
configuring Ethernet switches for security; the
focus is on L2 attacks and their mitigation
Zobrazit stránku 2
1 2 3 4 5 6 7 8 ... 83 84

Komentáře k této Příručce

Žádné komentáře