Skip to main content

Network Infrastructure Security ’ Switching

  • Chapter
  • First Online:
Network Infrastructure Security
  • 1259 Accesses

This chapter focuses on the network infrastructure security at data link layer, with particular concern on switch security. The goals are not simply to list out the available attacks, but also to clearly explain how these attacks operate and the working principles behind them by the effective use of illustrations. The protocols being exploited in this chapter include Address Resolution Protocol (ARP), Spanning Tree Protocol (STP), and Virtual Local Area Network (VLAN) protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. Steve A. Rouiller, “Virtual LAN Security-:weaknesses and countermeasures,” SANS Institute

    Google Scholar 

  2. Sean Convery, “Hacking layer 2 fun with Ethernet switches,” http://www.blackhat.com/presentations/bh-usa-02/bh-us-02-convery-switches.pdf

  3. “Layer 2 switching attacks and mitigation,” Networker, Dec. 2002.

    Google Scholar 

  4. “Virtual LAN Security Best Practices,” http://www.cisco.com/warp/public/cc/pd/si/casi/ca6000/prodlit/vlnwp_wp.pdf

  5. Eric Vyncke and Christopher Paggen, “LAN Switch Security: What Hackers Know About Your Switches,” Cisco Press, Sept. 2007.

    Google Scholar 

  6. Connie Howard, “Layer 2-the weakest link,” Packet, vol. 15, no. 1, first quarter 2003.

    Google Scholar 

  7. “Configuring Port Security,” http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_19_ea1/configuration/guide/swtrafc.html#wp1038501

  8. Sean Whalen, “An Introduction to ARP Spoofing,” http://www.node99.org/projects/arpspoof/

  9. Mao, “Introduction to arp poison routing,” http://www.oxid.it/downloads/apr-intro.swf

  10. Sean Convery, “Network Security Architectures,” Cisco Press, 2004.

    Google Scholar 

  11. Connie Howard, “Layer 2-the weakest link,” Packet, vol. 15, no. 1, first quarter 2003.

    Google Scholar 

  12. Oleg K. Artemjev and Vladislav V. Myasnyankin, “Fun with the Spanning Tree Protocol,”

    Google Scholar 

  13. “Understanding Spanning-Tree Protocol Topology Changes,” http://www.cisco.com/warp/public/473/17.html

  14. “Understanding Rapid Spanning Tree Protocol,” http://www.cisco.com/warp/public/473/146.html

  15. Guillermo Mario Marro, “Attacks at the data link layer,” MSc thesis in Computer Science of the University of California Davis, http://seclab.cs.ucdavis.edu/papers/Marro_masters_thesis.pdf

  16. “BPDU guard -Spanning Tree Portfast BPDU Guard Enhancement,” http://www.cisco.com/en/US/tech/tk389/tk621/ technologies_tech_note09186a008009482f.shtml

  17. “Root Guard - Spanning Tree Portfast BPDU Guard Enhancement,” http://www.cisco.com/en/US/tech/tk389/tk621/technologies_tech_note09186a00800ae96b.shtml

  18. Andrew Vladimirov, Konstantin Gavrilenko and Andrei Mikhailovsky, “Protocol Exploitation in Cisco Networking Environments,” Hacking Exposed Cisco Networks – Part III, McGraw-Hill Osborne Media, 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag US

About this chapter

Cite this chapter

Wong, A., Yeung, A. (2009). Network Infrastructure Security ’ Switching. In: Network Infrastructure Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-0166-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-0166-8_2

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-0165-1

  • Online ISBN: 978-1-4419-0166-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics