Module : Configure Filtering on a Switch
Module Overview
Introduction to Layer 2 Attacks
Types of attacks
MAC Address, ARP, and DHCP Vulnerabilities
CAM table overflow attack
Mitigating the CAM table overflow attack
MAC spoofing – man in the middle attacks
Mitigating MAC spoofing attacks
Using dynamic ARP inspection to mitigate MAC spoofing attacks
DHCP starvation attacks
Mitigating DHCP starvation attacks
VLAN Vulnerabilities
VLAN hopping attacks
Mitigating VLAN hopping attacks
Private VLAN vulnerabilities
Defending private VLANs
Spanning-Tree Protocol Vulnerabilities
Spanning-Tree Protocol vulnerabilities
Preventing Spanning-Tree Protocol manipulation
Module: Summary
Module: Quiz



Close Window
All contents copyright ©2001-2005 Cisco Systems, Inc. All rights reserved.