Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

LAN Switch Security : What Hackers Know About Your Switches, PDF eBook

LAN Switch Security : What Hackers Know About Your Switches PDF

PDF

Please note: eBooks can only be purchased with a UK issued credit card and all our eBooks (ePub and PDF) are DRM protected.

Description

Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [STP], Cisco(R) Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration Protocol (DHCP). LAN Switch Security explains all the vulnerabilities in a network infrastructure related to Ethernet switches. Further, this book shows you how to configure a switch to prevent or to mitigate attacks based on those vulnerabilities. This book also includes a section on how to use an Ethernet switch to increase the security of a network and prevent future attacks.

Divided into four parts, LAN Switch Security provides you with steps you can take to ensure the integrity of both voice and data traffic traveling over Layer 2 devices. Part I covers vulnerabilities in Layer 2 protocols and how to configure switches to prevent attacks against those vulnerabilities. Part II addresses denial-of-service (DoS) attacks on an Ethernet switch and shows how those attacks can be mitigated. Part III shows how a switch can actually augment the security of a network through the utilization of wirespeed access control list (ACL) processing and IEEE 802.1x for user authentication and authorization. Part IV examines future developments from the LinkSec working group at the IEEE. For all parts, most of the content is vendor independent and is useful for all network architects deploying Ethernet switches.

After reading this book, you will have an in-depth understanding of LAN security and be prepared to plug the security holes that exist in a great number of campus networks.

  • Use port security to protect against CAM attacks
  • Prevent spanning-tree attacks
  • Isolate VLANs with proper configuration techniques
  • Protect against rogue DHCP servers
  • Block ARP snooping
  • Prevent IPv6 neighbor discovery and router solicitation exploitation
  • Identify Power over Ethernet vulnerabilities
  • Mitigate risks from HSRP and VRPP
  • Stop information leaks with CDP, PaGP, VTP, CGMP and other Cisco ancillary protocols
  • Understand and prevent DoS attacks against switches
  • Enforce simple wirespeed security policies with ACLs
  • Implement user authentication on a port base with IEEE 802.1x
  • Use new IEEE protocols to encrypt all Ethernet frames at wirespeed.

This security book is part of the Cisco Press(R) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Information

Other Formats

Information