LAN switch security : what hackers know about your switches
(eBook)
Author
Contributors
Published
Indianapolis, Ind. : Cisco Press, 2007.
Format
eBook
ISBN
1587052563, 9781587052569
Physical Desc
1 online resource
Status
Description
Loading Description...
Also in this Series
Checking series information...
More Details
Language
English
UPC
9781587052569
Notes
Bibliography
Includes bibliographical references and index.
Description
LAN Switch Security: What Hackers Know About Your Switches A practical guide to hardening Layer 2 devices and stopping campus network attacks Eric Vyncke Christopher Paggen, CCIE® No. 2659 Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [STP], Cisco® Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration Protocol (DHCP). LAN Switch Security explains all the vulnerabilities in a network infrastructure related to Ethernet switches. Further, this book shows you how to configure a switch to prevent or to mitigate attacks based on those vulnerabilities. This book also includes a section on how to use an Ethernet switch to increase the security of a network and prevent future attacks. Divided into four parts, LAN Switch Security provides you with steps you can take to ensure the integrity of both voice and data traffic traveling over Layer 2 devices. Part I covers vulnerabilities in Layer 2 protocols and how to configure switches to prevent attacks against those vulnerabilities. Part II addresses denial-of-service (DoS) attacks on an Ethernet switch and shows how those attacks can be mitigated. Part III shows how a switch can actually augment the security of a network through the utilization of wirespeed access control list (ACL) processing and IEEE 802.1x for user authentication and authorization. Part IV examines future developments from the LinkSec working group at the IEEE. For all parts, most of the content is vendor independent and is useful for all network architects deploying Ethernet switches. After reading this book, you will have an in-depth understanding of LAN security and be prepared to plug the security holes that exist in a great number of campus networks. Eric Vyncke has a master's degree in computer science engineering from the University of Liège in Belgium. Since 1997, Eric has worked as a Distinguished Consulting Engineer for Cisco, where he is a technical consultant for security covering Europe. His area of expertise for 20 years has been mainly security from Layer 2 to applications. He is also guest professor at Belgian universities for security seminars. Christopher Paggen, CCIE® No. 2659, obtained a degree in computer science from IESSL in Liège (Belgium) and a master's degree in econ...
Reviews from GoodReads
Loading GoodReads Reviews.
Citations
APA Citation, 7th Edition (style guide)
Vyncke, E., & Paggen, C. (2007). LAN switch security: what hackers know about your switches . Cisco Press.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Vyncke, Eric and Christopher. Paggen. 2007. LAN Switch Security: What Hackers Know About Your Switches. Cisco Press.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Vyncke, Eric and Christopher. Paggen. LAN Switch Security: What Hackers Know About Your Switches Cisco Press, 2007.
MLA Citation, 9th Edition (style guide)Vyncke, Eric., and Christopher Paggen. LAN Switch Security: What Hackers Know About Your Switches Cisco Press, 2007.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
0d0b3165-a6b5-a108-9fb2-e4ca7dd98a1e-eng
Grouping Information
Grouped Work ID | 0d0b3165-a6b5-a108-9fb2-e4ca7dd98a1e-eng |
---|---|
Full title | lan switch security what hackers know about your switches |
Author | vyncke eric |
Grouping Category | book |
Last Update | 2024-09-06 16:31:08PM |
Last Indexed | 2024-09-20 02:09:22AM |
Marc Record
First Detected | Jul 29, 2024 03:56:42 PM |
---|---|
Last File Modification Time | Sep 06, 2024 04:32:11 PM |
MARC Record
LEADER | 05349cam a2200457 a 4500 | ||
---|---|---|---|
001 | ocn183318228 | ||
003 | OCoLC | ||
005 | 20240830103855.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 071211s2007 inu ob 001 0 eng d | ||
019 | |a 1112550934 | ||
020 | |a 1587052563|q (paperback) | ||
020 | |a 9781587052569|q (paperback) | ||
024 | 8 | |a 9781587052569 | |
035 | |a (OCoLC)183318228|z (OCoLC)1112550934 | ||
037 | |a CL0500000016|b Safari Books Online | ||
040 | |a UMI|b eng|e pn|c UMI|d OCLCQ|d TXJ|d CEF|d OCLCQ|d NHM|d DEBSZ|d OCLCQ|d OCLCO|d CNNAI|d OCLCQ|d OCLCF|d AU@|d OCLCQ|d UAB|d CNCEN|d ERF|d OCLCO|d OCLCQ|d OCLCO|d OCLCL|d OCLCQ | ||
049 | |a FMGA | ||
050 | 4 | |a TK5105.7|b .V96 2007 | |
082 | 0 | 4 | |a 005.8 V996 2007 [ONLINE] |
100 | 1 | |a Vyncke, Eric. | |
245 | 1 | 0 | |a LAN switch security :|b what hackers know about your switches /|c Eric Vyncke and Christopher Paggen. |
246 | 3 | 0 | |a What hackers know about your switches |
260 | |a Indianapolis, Ind. :|b Cisco Press,|c 2007. | ||
300 | |a 1 online resource | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
347 | |a text file | ||
490 | 1 | |a Cisco Press networking technology series | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a pt. I. Vulnerabilities and mitigation techniques -- Ch. 1. Introduction to security -- Ch. 2. Defeating a learning bridge's forwarding process -- Ch. 3. Attacking the spanning tree protocol -- Ch. 4. Are VLANS safe? -- Ch. 5. Leveraging DHCP weaknesses -- Ch. 6. Exploiting IPv4 ARP -- Ch. 7. Exploiting IPv6 neighbor discovery and router advertisement -- Ch. 8. What about power over ethernet? -- Ch. 9. Is HSRP resilient? -- Ch. 10. Can we bring VRRP down? -- Ch. 11. Information leaks with Cisco ancillary protocols -- pt. II. How can a switch sustain a denial of service attack? -- Ch. 12. Introduction to denial of service attacks -- Ch. 13. Control plane policing -- Ch. 14. Disabling control plane protocols -- Ch. 15. Using switches to detect a data plane DoS -- pt. III. Using switches to augment the network security -- Ch. 16. Wire speed access control lists -- Ch. 17. Identity-based networking services with 802.1X -- pt. IV. What is next in LAN security? -- Ch. 18. IEEE 802.1AE -- App. Combining IPsec with L2TPv3 for secure pseudowire. | |
520 | |a LAN Switch Security: What Hackers Know About Your Switches A practical guide to hardening Layer 2 devices and stopping campus network attacks Eric Vyncke Christopher Paggen, CCIE® No. 2659 Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [STP], Cisco® Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration Protocol (DHCP). LAN Switch Security explains all the vulnerabilities in a network infrastructure related to Ethernet switches. Further, this book shows you how to configure a switch to prevent or to mitigate attacks based on those vulnerabilities. This book also includes a section on how to use an Ethernet switch to increase the security of a network and prevent future attacks. Divided into four parts, LAN Switch Security provides you with steps you can take to ensure the integrity of both voice and data traffic traveling over Layer 2 devices. Part I covers vulnerabilities in Layer 2 protocols and how to configure switches to prevent attacks against those vulnerabilities. Part II addresses denial-of-service (DoS) attacks on an Ethernet switch and shows how those attacks can be mitigated. Part III shows how a switch can actually augment the security of a network through the utilization of wirespeed access control list (ACL) processing and IEEE 802.1x for user authentication and authorization. Part IV examines future developments from the LinkSec working group at the IEEE. For all parts, most of the content is vendor independent and is useful for all network architects deploying Ethernet switches. After reading this book, you will have an in-depth understanding of LAN security and be prepared to plug the security holes that exist in a great number of campus networks. Eric Vyncke has a master's degree in computer science engineering from the University of Liège in Belgium. Since 1997, Eric has worked as a Distinguished Consulting Engineer for Cisco, where he is a technical consultant for security covering Europe. His area of expertise for 20 years has been mainly security from Layer 2 to applications. He is also guest professor at Belgian universities for security seminars. Christopher Paggen, CCIE® No. 2659, obtained a degree in computer science from IESSL in Liège (Belgium) and a master's degree in econ... | ||
542 | |f Copyright© 2008 Cisco Systems, Inc.|g 2008 | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Local area networks (Computer networks)|x Security measures.|0 http://id.loc.gov/authorities/subjects/sh94000861 | |
650 | 0 | |a Telecommunication|x Switching systems|x Security measures. | |
700 | 1 | |a Paggen, Christopher. | |
830 | 0 | |a Cisco Press networking technology series.|0 http://id.loc.gov/authorities/names/no2001079833 | |
856 | 4 | 0 | |u https://www.aclib.us/OReilly |