Protecting against VLAN hopping attacks using a Cisco switch

Поделиться
HTML-код
  • Опубликовано: 18 сен 2024
  • This video covers how to configure access and trunk ports and to disable DTP to protect against VLAN hopping attacks.

Комментарии • 7

  • @HiPh0Plover1
    @HiPh0Plover1 2 года назад +1

    @5:52 in vlan summary , why int g0/1 is not showing in vlan 40 ?

    • @muhsin_sultan
      @muhsin_sultan Год назад

      cuz its a trunk interface, not attached a singular VLAN

  • @northblue8216
    @northblue8216 2 года назад

    Ok, good, but what if you want to use VTP? I'm assuming you would still assign ports to blackhole and issue shut command? Or would you do all of that, but require mac authorisation or something like Network Access control?

    • @ddaltonyvcc
      @ddaltonyvcc  2 года назад +2

      I would still use the blackhole VLAN and shutdown command. MAC authorization can be helpful but by itself it is not enough.

    • @northblue8216
      @northblue8216 2 года назад +1

      @@ddaltonyvcc thank you.

  • @Morawka1
    @Morawka1 10 месяцев назад

    would've liked to have seen allowed vlans on the trunk link

    • @ddaltonyvcc
      @ddaltonyvcc  10 месяцев назад

      You can definitely do that. One challenge is that people sometimes forget to update the trunk line if they add additional VLANs. They then wonder why their new VLAN isn't working. If you can remember to update the VLANs allowed on specific trunks, that can be a security feature.