NET-04-P1 Switch Security Flashcards
is when attackers change their own physical PC address to conceal their true identity and pose as someone else. For example, an attacker may spoof a MAC address with a legitimate MAC address, to bypass an access control mechanism such as port security
MAC spoofing
is an attack that targets a switch’s MAC table. The idea is to flood the table with a large number of fake addresses. When the list of addresses exceeds the maximum seize of the table, the switch will initiate its fallback mode and begin to act as a hub, meaning every frame will be forwarded to every host on the network
CAM Table Overflow
The feature used to restrict input to an interface by limiting MAC addresses of workstations that are allowed to access a specific port
Port Security
the default violation mode
Shutdown
Ethernet frames with unauthorized source MAC addresses are dropped. The switch provides notification of security violations and keeps count of the number of violations
Restrict
Ethernet frames with unauthorized source MAC addresses are dropped. In this violation mode, the switch does not provide notification regarding this event
Protect
requires static configuration of each allowed MAC address and its assignment to an interface. Most secured method but is very time consuming and open to faulty configuration
Manual
allowed MAC addresses are learned dynamically and are limited to the maximum number configured for the interface. The switch learns the source address of the first few devices associated with the interface. providing a fast and scalable method of operation
Sticky
although the number of default MAC addresses allowed in Port Security is one, the number an be changed within the range of 1 to 3072
Max Allowed MAC address
When a switch port is in Err-disabled mode, the port may have been disabled automatically by the switch operating system, due to port security shutdown mode violation
Err-disabled
This state occurs when two parties, set for point-to-point communication, are configured to use different duplex mode
Duplex Mismatch
A faulty network interface card with software or hardware issues may trigger the Err-disabled state
Bad NIC
When there is a broadcast volume too large for processing in the broadcast domain
Broadcast Storms
presenting the authorized MAC addresses associated with a port and the type (sticky or manually) is done with this command
show port-security address
can be run for a quick overview of the configuration
show port-security