Module 14: Layer Two Considerations Flashcards
What is Layer 2 on the OSI Model
Data Link (ethernet frames) - If layer 2 is compromised all layers above are too.
What is the weakest link in the OSI Model
Layer 2
What are some types of Layer 2 Attacks
Mac Table Attacks VLAN Attacks DHCP Attacks ARP Attacks Address Spoofing Attacks
How to mitigate MAC Table Attacks
Port Security to limit the number of Valid MAC addresses allowed
How to secure unused ports?
Disable all unused ports
What is VLAN hopping?
a attacking host can gain access to all traffic on a VLAN that would not normally be accessible.
How to mitigate VLAN hopping?
Disable DTP (autotrunking)
What is DHCP Starvation Attack?
is to DOS connecting clients to the DHCP server
What is a DHCP Spoofing Attack
when a rouge DHCP server is connected to the network and provides false IP configs.
How to mitigate DHCP attacks
Enable DHCP snooping on trusted ports. Or limit the rate of the number of DHCP discovery messages a untrusted port can recieve.
How to mitigate a ARP attack
Enable DAI (dynamic ARP inspection)