Protecting against VLAN hopping attacks using a Cisco switch

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 ม.ค. 2025

ความคิดเห็น • 7

  • @HiPh0Plover1
    @HiPh0Plover1 2 ปีที่แล้ว +1

    @5:52 in vlan summary , why int g0/1 is not showing in vlan 40 ?

    • @muhsin_sultan
      @muhsin_sultan 2 ปีที่แล้ว

      cuz its a trunk interface, not attached a singular VLAN

  • @northblue8216
    @northblue8216 2 ปีที่แล้ว

    Ok, good, but what if you want to use VTP? I'm assuming you would still assign ports to blackhole and issue shut command? Or would you do all of that, but require mac authorisation or something like Network Access control?

    • @ddaltonyvcc
      @ddaltonyvcc  2 ปีที่แล้ว +2

      I would still use the blackhole VLAN and shutdown command. MAC authorization can be helpful but by itself it is not enough.

    • @northblue8216
      @northblue8216 2 ปีที่แล้ว +1

      @@ddaltonyvcc thank you.

  • @Morawka1
    @Morawka1 ปีที่แล้ว

    would've liked to have seen allowed vlans on the trunk link

    • @ddaltonyvcc
      @ddaltonyvcc  ปีที่แล้ว

      You can definitely do that. One challenge is that people sometimes forget to update the trunk line if they add additional VLANs. They then wonder why their new VLAN isn't working. If you can remember to update the VLANs allowed on specific trunks, that can be a security feature.